"In October 2006, this author presented a paper exploring the threat of Inter-Protocol Communication. That is, the possibility of two different applications using two different protocols to meaningfully exchange commands and data. This paper extends that and other research to explore Inter-Protocol Exploitation. These findings demonstrate the practicality of encapsulating exploit code in one protocol to compromise a program which uses a different protocol."
"Research within the area of web browser security, particularly Browser Exploitation Frameworks, Cross-site scripting Viruses and Inter-Protocol Communication has become a catalyst for further exploration into Inter-Protocol Exploitation. That is, an attack vector which encapsulates malicious data within a particular protocol in such a way that the resultant data stream is capable of exploiting a different application which uses a different protocol entirely.
For successful exploitation across protocols, at least one precondition needs to be met: a method to encapsulate the exploit within the carrier protocol. Depending on the complexity of the handshake, error tolerance and protocol encapsulation may also be required. These two conditions are discussed in the paper �Inter-Protocol Communication�, which is the suggested preliminary reading for this paper.