Ethical considerations are important here too. Since it's about protocol analysis, the paper should emphasize responsible use, avoiding malicious applications. Maybe a section on how the research promotes better security practices through proactive analysis.