Cross Layer Attacks And How To Use Them