Assessing and Exploiting
Proprietary RF Protocols