Protection techniques
Identification
Develop exploit