ATTACK 1 -- (Id: 6549) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, c2(K:6365:*), nm4, c4(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6363:*)).out(nm4,c4(K:6363:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6365:*),c2(K:6365:*)).out(B2,c2(K:6365:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> A4: c4(K:6363:*) A4 -> I: nm4,c4(K:6363:*) I -> B2: m2(K:6365:*),c2(K:6365:*) B2 -> I: B2,c2(K:6365:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 2 -- (Id: 6555) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, c2(K:6365:*), nm4, c4(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6363:*)).out(nm4,c4(K:6363:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6365:*),c2(K:6365:*)).out(B2,c2(K:6365:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> A4: c4(K:6363:*) A4 -> I: nm4,c4(K:6363:*) I -> B2: m2(K:6365:*),c2(K:6365:*) B2 -> I: B2,c2(K:6365:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 3 -- (Id: 6563) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6381:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6363:*)).out(nm4,c4(K:6363:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6381:*),c2(K:6381:*)).out(B2,c2(K:6381:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> A4: c4(K:6363:*) A4 -> I: nm4,c4(K:6363:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6381:*),c2(K:6381:*) B2 -> I: B2,c2(K:6381:*) I -> B2: {A4,na3}k!10 |
ATTACK 4 -- (Id: 6569) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:6379:*), {A4,na3}kss1, nm4, c4(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6363:*)).out(nm4,c4(K:6363:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6379:*),c2(K:6379:*)).out(B2,c2(K:6379:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> A4: c4(K:6363:*) A4 -> I: nm4,c4(K:6363:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6379:*),c2(K:6379:*) B2 -> I: B2,c2(K:6379:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 5 -- (Id: 6577) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6393:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6363:*)).out(nm4,c4(K:6363:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6393:*),c2(K:6393:*)).out(B2,c2(K:6393:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> A4: c4(K:6363:*) A4 -> I: nm4,c4(K:6363:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6393:*),c2(K:6393:*) B2 -> I: B2,c2(K:6393:*) I -> B2: {A3,na4}k!10 |
ATTACK 6 -- (Id: 6583) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:6391:*), {A3,na4}kss1, nm4, c4(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6363:*)).out(nm4,c4(K:6363:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6391:*),c2(K:6391:*)).out(B2,c2(K:6391:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> A4: c4(K:6363:*) A4 -> I: nm4,c4(K:6363:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6391:*),c2(K:6391:*) B2 -> I: B2,c2(K:6391:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 7 -- (Id: 6593) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6403:*), c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6403:*)).out(nm4,c4(K:6403:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> A4: c4(K:6403:*) A4 -> I: nm4,c4(K:6403:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 8 -- (Id: 6599) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6403:*), c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6403:*)).out(nm4,c4(K:6403:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> A4: c4(K:6403:*) A4 -> I: nm4,c4(K:6403:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 9 -- (Id: 6607) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6419:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6419:*)).out(nm4,c4(K:6419:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6419:*) A4 -> I: nm4,c4(K:6419:*) I -> B2: {A4,na3}k!10 |
ATTACK 10 -- (Id: 6611) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6423:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6423:*)).out(nm4,c4(K:6423:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:6423:*) A4 -> I: nm4,c4(K:6423:*) |
ATTACK 11 -- (Id: 6617) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:6417:*), {A4,na3}kss1, c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6417:*)).out(nm4,c4(K:6417:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6417:*) A4 -> I: nm4,c4(K:6417:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 12 -- (Id: 6625) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6434:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6434:*)).out(nm4,c4(K:6434:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:6434:*) A4 -> I: nm4,c4(K:6434:*) I -> B2: {A3,na4}k!10 |
ATTACK 13 -- (Id: 6629) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6438:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6438:*)).out(nm4,c4(K:6438:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:6438:*) A4 -> I: nm4,c4(K:6438:*) |
ATTACK 14 -- (Id: 6635) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:6432:*), {A3,na4}kss1, c2(K:6363:*), nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6432:*)).out(nm4,c4(K:6432:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6363:*),c2(K:6363:*)).out(B2,c2(K:6363:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> B2: m2(K:6363:*),c2(K:6363:*) B2 -> I: B2,c2(K:6363:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:6432:*) A4 -> I: nm4,c4(K:6432:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 15 -- (Id: 6645) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6452:*), c2(K:6449:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6452:*)).out(nm4,c4(K:6452:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6449:*),c2(K:6449:*)).out(B2,c2(K:6449:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6449:*),c2(K:6449:*) B2 -> I: B2,c2(K:6449:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:6452:*) A4 -> I: nm4,c4(K:6452:*) |
ATTACK 16 -- (Id: 6649) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6451:*), c2(K:6449:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6451:*)).out(nm4,c4(K:6451:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6449:*),c2(K:6449:*)).out(B2,c2(K:6449:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6449:*),c2(K:6449:*) B2 -> I: B2,c2(K:6449:*) I -> A4: c4(K:6451:*) A4 -> I: nm4,c4(K:6451:*) I -> B2: {A4,na3}k!10 |
ATTACK 17 -- (Id: 6655) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6459:*), nm4, c4(K:6449:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6449:*)).out(nm4,c4(K:6449:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6459:*),c2(K:6459:*)).out(B2,c2(K:6459:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6449:*) A4 -> I: nm4,c4(K:6449:*) I -> B2: m2(K:6459:*),c2(K:6459:*) B2 -> I: B2,c2(K:6459:*) I -> B2: {A4,na3}k!10 |
ATTACK 18 -- (Id: 6663) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6467:*), {A4,na3}k!10, c2(K:6447:*), {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6467:*)).out(nm4,c4(K:6467:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6447:*),c2(K:6447:*)).out(B2,c2(K:6447:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6447:*),c2(K:6447:*) B2 -> I: B2,c2(K:6447:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:6467:*) A4 -> I: nm4,c4(K:6467:*) |
ATTACK 19 -- (Id: 6667) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6466:*), {A4,na3}k!10, c2(K:6447:*), {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6466:*)).out(nm4,c4(K:6466:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6447:*),c2(K:6447:*)).out(B2,c2(K:6447:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6447:*),c2(K:6447:*) B2 -> I: B2,c2(K:6447:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6466:*) A4 -> I: nm4,c4(K:6466:*) I -> B2: {A4,na3}k!10 |
ATTACK 20 -- (Id: 6673) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:6464:*), c2(K:6447:*), {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6464:*)).out(nm4,c4(K:6464:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6447:*),c2(K:6447:*)).out(B2,c2(K:6447:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6447:*),c2(K:6447:*) B2 -> I: B2,c2(K:6447:*) I -> A4: c4(K:6464:*) A4 -> I: nm4,c4(K:6464:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 21 -- (Id: 6681) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:6479:*), nm4, c4(K:6447:*), {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6447:*)).out(nm4,c4(K:6447:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6479:*),c2(K:6479:*)).out(B2,c2(K:6479:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6447:*) A4 -> I: nm4,c4(K:6447:*) I -> B2: m2(K:6479:*),c2(K:6479:*) B2 -> I: B2,c2(K:6479:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 22 -- (Id: 6687) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6486:*), {A4,na3}k!10, nm4, c4(K:6447:*), {A4,na3}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6447:*)).out(nm4,c4(K:6447:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6486:*),c2(K:6486:*)).out(B2,c2(K:6486:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6447:*) A4 -> I: nm4,c4(K:6447:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6486:*),c2(K:6486:*) B2 -> I: B2,c2(K:6486:*) I -> B2: {A4,na3}k!10 |
ATTACK 23 -- (Id: 6697) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6496:*), c2(K:6493:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6496:*)).out(nm4,c4(K:6496:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6493:*),c2(K:6493:*)).out(B2,c2(K:6493:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6493:*),c2(K:6493:*) B2 -> I: B2,c2(K:6493:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:6496:*) A4 -> I: nm4,c4(K:6496:*) |
ATTACK 24 -- (Id: 6701) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6495:*), c2(K:6493:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6495:*)).out(nm4,c4(K:6495:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6493:*),c2(K:6493:*)).out(B2,c2(K:6493:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6493:*),c2(K:6493:*) B2 -> I: B2,c2(K:6493:*) I -> A4: c4(K:6495:*) A4 -> I: nm4,c4(K:6495:*) I -> B2: {A3,na4}k!10 |
ATTACK 25 -- (Id: 6707) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6503:*), nm4, c4(K:6493:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6493:*)).out(nm4,c4(K:6493:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6503:*),c2(K:6503:*)).out(B2,c2(K:6503:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:6493:*) A4 -> I: nm4,c4(K:6493:*) I -> B2: m2(K:6503:*),c2(K:6503:*) B2 -> I: B2,c2(K:6503:*) I -> B2: {A3,na4}k!10 |
ATTACK 26 -- (Id: 6715) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6511:*), {A3,na4}k!10, c2(K:6491:*), {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6511:*)).out(nm4,c4(K:6511:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6491:*),c2(K:6491:*)).out(B2,c2(K:6491:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6491:*),c2(K:6491:*) B2 -> I: B2,c2(K:6491:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:6511:*) A4 -> I: nm4,c4(K:6511:*) |
ATTACK 27 -- (Id: 6719) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6510:*), {A3,na4}k!10, c2(K:6491:*), {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6510:*)).out(nm4,c4(K:6510:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6491:*),c2(K:6491:*)).out(B2,c2(K:6491:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6491:*),c2(K:6491:*) B2 -> I: B2,c2(K:6491:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:6510:*) A4 -> I: nm4,c4(K:6510:*) I -> B2: {A3,na4}k!10 |
ATTACK 28 -- (Id: 6725) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:6508:*), c2(K:6491:*), {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6508:*)).out(nm4,c4(K:6508:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6491:*),c2(K:6491:*)).out(B2,c2(K:6491:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6491:*),c2(K:6491:*) B2 -> I: B2,c2(K:6491:*) I -> A4: c4(K:6508:*) A4 -> I: nm4,c4(K:6508:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 29 -- (Id: 6733) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:6523:*), nm4, c4(K:6491:*), {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6491:*)).out(nm4,c4(K:6491:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6523:*),c2(K:6523:*)).out(B2,c2(K:6523:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:6491:*) A4 -> I: nm4,c4(K:6491:*) I -> B2: m2(K:6523:*),c2(K:6523:*) B2 -> I: B2,c2(K:6523:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 30 -- (Id: 6739) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6530:*), {A3,na4}k!10, nm4, c4(K:6491:*), {A3,na4}kss1, nm3, c3(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6491:*)).out(nm4,c4(K:6491:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6361:*)).out(nm3,c3(K:6361:*))] B2: () [in(m2(K:6530:*),c2(K:6530:*)).out(B2,c2(K:6530:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A3: c3(K:6361:*) A3 -> I: nm3,c3(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:6491:*) A4 -> I: nm4,c4(K:6491:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6530:*),c2(K:6530:*) B2 -> I: B2,c2(K:6530:*) I -> B2: {A3,na4}k!10 |
ATTACK 31 -- (Id: 6751) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, c2(K:6537:*), nm3, c3(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6535:*)).out(nm3,c3(K:6535:*))] B2: () [in(m2(K:6537:*),c2(K:6537:*)).out(B2,c2(K:6537:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> A3: c3(K:6535:*) A3 -> I: nm3,c3(K:6535:*) I -> B2: m2(K:6537:*),c2(K:6537:*) B2 -> I: B2,c2(K:6537:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 32 -- (Id: 6757) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, c2(K:6537:*), nm3, c3(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6535:*)).out(nm3,c3(K:6535:*))] B2: () [in(m2(K:6537:*),c2(K:6537:*)).out(B2,c2(K:6537:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> A3: c3(K:6535:*) A3 -> I: nm3,c3(K:6535:*) I -> B2: m2(K:6537:*),c2(K:6537:*) B2 -> I: B2,c2(K:6537:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 33 -- (Id: 6765) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6553:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6535:*)).out(nm3,c3(K:6535:*))] B2: () [in(m2(K:6553:*),c2(K:6553:*)).out(B2,c2(K:6553:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> A3: c3(K:6535:*) A3 -> I: nm3,c3(K:6535:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6553:*),c2(K:6553:*) B2 -> I: B2,c2(K:6553:*) I -> B2: {A4,na3}k!10 |
ATTACK 34 -- (Id: 6771) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:6551:*), {A4,na3}kss1, nm3, c3(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6535:*)).out(nm3,c3(K:6535:*))] B2: () [in(m2(K:6551:*),c2(K:6551:*)).out(B2,c2(K:6551:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> A3: c3(K:6535:*) A3 -> I: nm3,c3(K:6535:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6551:*),c2(K:6551:*) B2 -> I: B2,c2(K:6551:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 35 -- (Id: 6779) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6565:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6535:*)).out(nm3,c3(K:6535:*))] B2: () [in(m2(K:6565:*),c2(K:6565:*)).out(B2,c2(K:6565:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> A3: c3(K:6535:*) A3 -> I: nm3,c3(K:6535:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6565:*),c2(K:6565:*) B2 -> I: B2,c2(K:6565:*) I -> B2: {A3,na4}k!10 |
ATTACK 36 -- (Id: 6785) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:6563:*), {A3,na4}kss1, nm3, c3(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6535:*)).out(nm3,c3(K:6535:*))] B2: () [in(m2(K:6563:*),c2(K:6563:*)).out(B2,c2(K:6563:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> A3: c3(K:6535:*) A3 -> I: nm3,c3(K:6535:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6563:*),c2(K:6563:*) B2 -> I: B2,c2(K:6563:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 37 -- (Id: 6795) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6575:*), c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6575:*)).out(nm3,c3(K:6575:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> A3: c3(K:6575:*) A3 -> I: nm3,c3(K:6575:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 38 -- (Id: 6801) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6575:*), c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6575:*)).out(nm3,c3(K:6575:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> A3: c3(K:6575:*) A3 -> I: nm3,c3(K:6575:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 39 -- (Id: 6809) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6591:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6591:*)).out(nm3,c3(K:6591:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6591:*) A3 -> I: nm3,c3(K:6591:*) I -> B2: {A4,na3}k!10 |
ATTACK 40 -- (Id: 6813) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6595:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6595:*)).out(nm3,c3(K:6595:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:6595:*) A3 -> I: nm3,c3(K:6595:*) |
ATTACK 41 -- (Id: 6819) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:6589:*), {A4,na3}kss1, c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6589:*)).out(nm3,c3(K:6589:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6589:*) A3 -> I: nm3,c3(K:6589:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 42 -- (Id: 6827) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6606:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6606:*)).out(nm3,c3(K:6606:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:6606:*) A3 -> I: nm3,c3(K:6606:*) I -> B2: {A3,na4}k!10 |
ATTACK 43 -- (Id: 6831) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6610:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6610:*)).out(nm3,c3(K:6610:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:6610:*) A3 -> I: nm3,c3(K:6610:*) |
ATTACK 44 -- (Id: 6837) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:6604:*), {A3,na4}kss1, c2(K:6535:*), nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6604:*)).out(nm3,c3(K:6604:*))] B2: () [in(m2(K:6535:*),c2(K:6535:*)).out(B2,c2(K:6535:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> B2: m2(K:6535:*),c2(K:6535:*) B2 -> I: B2,c2(K:6535:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:6604:*) A3 -> I: nm3,c3(K:6604:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 45 -- (Id: 6847) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6624:*), c2(K:6621:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6624:*)).out(nm3,c3(K:6624:*))] B2: () [in(m2(K:6621:*),c2(K:6621:*)).out(B2,c2(K:6621:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6621:*),c2(K:6621:*) B2 -> I: B2,c2(K:6621:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:6624:*) A3 -> I: nm3,c3(K:6624:*) |
ATTACK 46 -- (Id: 6851) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6623:*), c2(K:6621:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6623:*)).out(nm3,c3(K:6623:*))] B2: () [in(m2(K:6621:*),c2(K:6621:*)).out(B2,c2(K:6621:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6621:*),c2(K:6621:*) B2 -> I: B2,c2(K:6621:*) I -> A3: c3(K:6623:*) A3 -> I: nm3,c3(K:6623:*) I -> B2: {A4,na3}k!10 |
ATTACK 47 -- (Id: 6857) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6631:*), nm3, c3(K:6621:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6621:*)).out(nm3,c3(K:6621:*))] B2: () [in(m2(K:6631:*),c2(K:6631:*)).out(B2,c2(K:6631:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6621:*) A3 -> I: nm3,c3(K:6621:*) I -> B2: m2(K:6631:*),c2(K:6631:*) B2 -> I: B2,c2(K:6631:*) I -> B2: {A4,na3}k!10 |
ATTACK 48 -- (Id: 6865) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6639:*), {A4,na3}k!10, c2(K:6619:*), {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6639:*)).out(nm3,c3(K:6639:*))] B2: () [in(m2(K:6619:*),c2(K:6619:*)).out(B2,c2(K:6619:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6619:*),c2(K:6619:*) B2 -> I: B2,c2(K:6619:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:6639:*) A3 -> I: nm3,c3(K:6639:*) |
ATTACK 49 -- (Id: 6869) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6638:*), {A4,na3}k!10, c2(K:6619:*), {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6638:*)).out(nm3,c3(K:6638:*))] B2: () [in(m2(K:6619:*),c2(K:6619:*)).out(B2,c2(K:6619:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6619:*),c2(K:6619:*) B2 -> I: B2,c2(K:6619:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6638:*) A3 -> I: nm3,c3(K:6638:*) I -> B2: {A4,na3}k!10 |
ATTACK 50 -- (Id: 6875) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:6636:*), c2(K:6619:*), {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6636:*)).out(nm3,c3(K:6636:*))] B2: () [in(m2(K:6619:*),c2(K:6619:*)).out(B2,c2(K:6619:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6619:*),c2(K:6619:*) B2 -> I: B2,c2(K:6619:*) I -> A3: c3(K:6636:*) A3 -> I: nm3,c3(K:6636:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 51 -- (Id: 6883) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:6651:*), nm3, c3(K:6619:*), {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6619:*)).out(nm3,c3(K:6619:*))] B2: () [in(m2(K:6651:*),c2(K:6651:*)).out(B2,c2(K:6651:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6619:*) A3 -> I: nm3,c3(K:6619:*) I -> B2: m2(K:6651:*),c2(K:6651:*) B2 -> I: B2,c2(K:6651:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 52 -- (Id: 6889) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6658:*), {A4,na3}k!10, nm3, c3(K:6619:*), {A4,na3}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6619:*)).out(nm3,c3(K:6619:*))] B2: () [in(m2(K:6658:*),c2(K:6658:*)).out(B2,c2(K:6658:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6619:*) A3 -> I: nm3,c3(K:6619:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6658:*),c2(K:6658:*) B2 -> I: B2,c2(K:6658:*) I -> B2: {A4,na3}k!10 |
ATTACK 53 -- (Id: 6899) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6668:*), c2(K:6665:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6668:*)).out(nm3,c3(K:6668:*))] B2: () [in(m2(K:6665:*),c2(K:6665:*)).out(B2,c2(K:6665:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6665:*),c2(K:6665:*) B2 -> I: B2,c2(K:6665:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:6668:*) A3 -> I: nm3,c3(K:6668:*) |
ATTACK 54 -- (Id: 6903) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6667:*), c2(K:6665:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6667:*)).out(nm3,c3(K:6667:*))] B2: () [in(m2(K:6665:*),c2(K:6665:*)).out(B2,c2(K:6665:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6665:*),c2(K:6665:*) B2 -> I: B2,c2(K:6665:*) I -> A3: c3(K:6667:*) A3 -> I: nm3,c3(K:6667:*) I -> B2: {A3,na4}k!10 |
ATTACK 55 -- (Id: 6909) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6675:*), nm3, c3(K:6665:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6665:*)).out(nm3,c3(K:6665:*))] B2: () [in(m2(K:6675:*),c2(K:6675:*)).out(B2,c2(K:6675:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:6665:*) A3 -> I: nm3,c3(K:6665:*) I -> B2: m2(K:6675:*),c2(K:6675:*) B2 -> I: B2,c2(K:6675:*) I -> B2: {A3,na4}k!10 |
ATTACK 56 -- (Id: 6917) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6683:*), {A3,na4}k!10, c2(K:6663:*), {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6683:*)).out(nm3,c3(K:6683:*))] B2: () [in(m2(K:6663:*),c2(K:6663:*)).out(B2,c2(K:6663:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6663:*),c2(K:6663:*) B2 -> I: B2,c2(K:6663:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:6683:*) A3 -> I: nm3,c3(K:6683:*) |
ATTACK 57 -- (Id: 6921) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6682:*), {A3,na4}k!10, c2(K:6663:*), {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6682:*)).out(nm3,c3(K:6682:*))] B2: () [in(m2(K:6663:*),c2(K:6663:*)).out(B2,c2(K:6663:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6663:*),c2(K:6663:*) B2 -> I: B2,c2(K:6663:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:6682:*) A3 -> I: nm3,c3(K:6682:*) I -> B2: {A3,na4}k!10 |
ATTACK 58 -- (Id: 6927) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:6680:*), c2(K:6663:*), {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6680:*)).out(nm3,c3(K:6680:*))] B2: () [in(m2(K:6663:*),c2(K:6663:*)).out(B2,c2(K:6663:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:6663:*),c2(K:6663:*) B2 -> I: B2,c2(K:6663:*) I -> A3: c3(K:6680:*) A3 -> I: nm3,c3(K:6680:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 59 -- (Id: 6935) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:6695:*), nm3, c3(K:6663:*), {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6663:*)).out(nm3,c3(K:6663:*))] B2: () [in(m2(K:6695:*),c2(K:6695:*)).out(B2,c2(K:6695:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:6663:*) A3 -> I: nm3,c3(K:6663:*) I -> B2: m2(K:6695:*),c2(K:6695:*) B2 -> I: B2,c2(K:6695:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 60 -- (Id: 6941) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6702:*), {A3,na4}k!10, nm3, c3(K:6663:*), {A3,na4}kss1, nm4, c4(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6361:*)).out(nm4,c4(K:6361:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6663:*)).out(nm3,c3(K:6663:*))] B2: () [in(m2(K:6702:*),c2(K:6702:*)).out(B2,c2(K:6702:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> A4: c4(K:6361:*) A4 -> I: nm4,c4(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:6663:*) A3 -> I: nm3,c3(K:6663:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:6702:*),c2(K:6702:*) B2 -> I: B2,c2(K:6702:*) I -> B2: {A3,na4}k!10 |
ATTACK 61 -- (Id: 6953) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6709:*), nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6709:*)).out(nm3,c3(K:6709:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> A3: c3(K:6709:*) A3 -> I: nm3,c3(K:6709:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 62 -- (Id: 6959) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6709:*), nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6709:*)).out(nm3,c3(K:6709:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> A3: c3(K:6709:*) A3 -> I: nm3,c3(K:6709:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 63 -- (Id: 6967) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6725:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6725:*)).out(nm3,c3(K:6725:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6725:*) A3 -> I: nm3,c3(K:6725:*) I -> B2: {A4,na3}k!10 |
ATTACK 64 -- (Id: 6971) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6729:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6729:*)).out(nm3,c3(K:6729:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:6729:*) A3 -> I: nm3,c3(K:6729:*) |
ATTACK 65 -- (Id: 6977) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:6723:*), {A4,na3}kss1, nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6723:*)).out(nm3,c3(K:6723:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6723:*) A3 -> I: nm3,c3(K:6723:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 66 -- (Id: 6985) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6740:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6740:*)).out(nm3,c3(K:6740:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:6740:*) A3 -> I: nm3,c3(K:6740:*) I -> B2: {A3,na4}k!10 |
ATTACK 67 -- (Id: 6989) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6744:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6744:*)).out(nm3,c3(K:6744:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:6744:*) A3 -> I: nm3,c3(K:6744:*) |
ATTACK 68 -- (Id: 6995) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:6738:*), {A3,na4}kss1, nm4, c4(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6707:*)).out(nm4,c4(K:6707:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6738:*)).out(nm3,c3(K:6738:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A4: c4(K:6707:*) A4 -> I: nm4,c4(K:6707:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:6738:*) A3 -> I: nm3,c3(K:6738:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 69 -- (Id: 7005) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:6753:*), nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6753:*)).out(nm4,c4(K:6753:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> A4: c4(K:6753:*) A4 -> I: nm4,c4(K:6753:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 70 -- (Id: 7011) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:6753:*), nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6753:*)).out(nm4,c4(K:6753:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> A4: c4(K:6753:*) A4 -> I: nm4,c4(K:6753:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 71 -- (Id: 7019) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6770:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6770:*)).out(nm4,c4(K:6770:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:6770:*) A4 -> I: nm4,c4(K:6770:*) |
ATTACK 72 -- (Id: 7023) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6769:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6769:*)).out(nm4,c4(K:6769:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6769:*) A4 -> I: nm4,c4(K:6769:*) I -> B2: {A4,na3}k!10 |
ATTACK 73 -- (Id: 7029) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:6767:*), {A4,na3}kss1, nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6767:*)).out(nm4,c4(K:6767:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6767:*) A4 -> I: nm4,c4(K:6767:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 74 -- (Id: 7037) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6785:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6785:*)).out(nm4,c4(K:6785:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:6785:*) A4 -> I: nm4,c4(K:6785:*) |
ATTACK 75 -- (Id: 7041) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6784:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6784:*)).out(nm4,c4(K:6784:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:6784:*) A4 -> I: nm4,c4(K:6784:*) I -> B2: {A3,na4}k!10 |
ATTACK 76 -- (Id: 7047) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:6782:*), {A3,na4}kss1, nm3, c3(K:6707:*), c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6782:*)).out(nm4,c4(K:6782:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6707:*)).out(nm3,c3(K:6707:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> A3: c3(K:6707:*) A3 -> I: nm3,c3(K:6707:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:6782:*) A4 -> I: nm4,c4(K:6782:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 77 -- (Id: 7057) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6801:*), nm3, c3(K:6799:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6801:*)).out(nm4,c4(K:6801:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6799:*)).out(nm3,c3(K:6799:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6799:*) A3 -> I: nm3,c3(K:6799:*) I -> A4: c4(K:6801:*) A4 -> I: nm4,c4(K:6801:*) I -> B2: {A4,na3}k!10 |
ATTACK 78 -- (Id: 7061) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6805:*), nm3, c3(K:6799:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6805:*)).out(nm4,c4(K:6805:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6799:*)).out(nm3,c3(K:6799:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6799:*) A3 -> I: nm3,c3(K:6799:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:6805:*) A4 -> I: nm4,c4(K:6805:*) |
ATTACK 79 -- (Id: 7067) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6809:*), nm4, c4(K:6799:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6799:*)).out(nm4,c4(K:6799:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6809:*)).out(nm3,c3(K:6809:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6799:*) A4 -> I: nm4,c4(K:6799:*) I -> A3: c3(K:6809:*) A3 -> I: nm3,c3(K:6809:*) I -> B2: {A4,na3}k!10 |
ATTACK 80 -- (Id: 7071) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6813:*), nm4, c4(K:6799:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6799:*)).out(nm4,c4(K:6799:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6813:*)).out(nm3,c3(K:6813:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6799:*) A4 -> I: nm4,c4(K:6799:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:6813:*) A3 -> I: nm3,c3(K:6813:*) |
ATTACK 81 -- (Id: 7077) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6818:*), nm4, c4(K:6816:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6816:*)).out(nm4,c4(K:6816:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6818:*)).out(nm3,c3(K:6818:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:6816:*) A4 -> I: nm4,c4(K:6816:*) I -> A3: c3(K:6818:*) A3 -> I: nm3,c3(K:6818:*) |
ATTACK 82 -- (Id: 7082) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6822:*), nm3, c3(K:6816:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6822:*)).out(nm4,c4(K:6822:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6816:*)).out(nm3,c3(K:6816:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:6816:*) A3 -> I: nm3,c3(K:6816:*) I -> A4: c4(K:6822:*) A4 -> I: nm4,c4(K:6822:*) |
ATTACK 83 -- (Id: 7090) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6828:*), {A4,na3}k!10, nm3, c3(K:6797:*), {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6828:*)).out(nm4,c4(K:6828:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6797:*)).out(nm3,c3(K:6797:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6797:*) A3 -> I: nm3,c3(K:6797:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6828:*) A4 -> I: nm4,c4(K:6828:*) I -> B2: {A4,na3}k!10 |
ATTACK 84 -- (Id: 7094) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6832:*), {A4,na3}k!10, nm3, c3(K:6797:*), {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6832:*)).out(nm4,c4(K:6832:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6797:*)).out(nm3,c3(K:6797:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6797:*) A3 -> I: nm3,c3(K:6797:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:6832:*) A4 -> I: nm4,c4(K:6832:*) |
ATTACK 85 -- (Id: 7100) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:6826:*), nm3, c3(K:6797:*), {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6826:*)).out(nm4,c4(K:6826:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6797:*)).out(nm3,c3(K:6797:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6797:*) A3 -> I: nm3,c3(K:6797:*) I -> A4: c4(K:6826:*) A4 -> I: nm4,c4(K:6826:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 86 -- (Id: 7108) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:6841:*), nm4, c4(K:6797:*), {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6797:*)).out(nm4,c4(K:6797:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6841:*)).out(nm3,c3(K:6841:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6797:*) A4 -> I: nm4,c4(K:6797:*) I -> A3: c3(K:6841:*) A3 -> I: nm3,c3(K:6841:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 87 -- (Id: 7114) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6848:*), {A4,na3}k!10, nm4, c4(K:6797:*), {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6797:*)).out(nm4,c4(K:6797:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6848:*)).out(nm3,c3(K:6848:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6797:*) A4 -> I: nm4,c4(K:6797:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6848:*) A3 -> I: nm3,c3(K:6848:*) I -> B2: {A4,na3}k!10 |
ATTACK 88 -- (Id: 7118) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6852:*), {A4,na3}k!10, nm4, c4(K:6797:*), {A4,na3}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6797:*)).out(nm4,c4(K:6797:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6852:*)).out(nm3,c3(K:6852:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6797:*) A4 -> I: nm4,c4(K:6797:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:6852:*) A3 -> I: nm3,c3(K:6852:*) |
ATTACK 89 -- (Id: 7128) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6860:*), nm3, c3(K:6858:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6860:*)).out(nm4,c4(K:6860:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6858:*)).out(nm3,c3(K:6858:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:6858:*) A3 -> I: nm3,c3(K:6858:*) I -> A4: c4(K:6860:*) A4 -> I: nm4,c4(K:6860:*) I -> B2: {A3,na4}k!10 |
ATTACK 90 -- (Id: 7132) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6864:*), nm3, c3(K:6858:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6864:*)).out(nm4,c4(K:6864:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6858:*)).out(nm3,c3(K:6858:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:6858:*) A3 -> I: nm3,c3(K:6858:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:6864:*) A4 -> I: nm4,c4(K:6864:*) |
ATTACK 91 -- (Id: 7138) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6868:*), nm4, c4(K:6858:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6858:*)).out(nm4,c4(K:6858:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6868:*)).out(nm3,c3(K:6868:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:6858:*) A4 -> I: nm4,c4(K:6858:*) I -> A3: c3(K:6868:*) A3 -> I: nm3,c3(K:6868:*) I -> B2: {A3,na4}k!10 |
ATTACK 92 -- (Id: 7142) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6872:*), nm4, c4(K:6858:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6858:*)).out(nm4,c4(K:6858:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6872:*)).out(nm3,c3(K:6872:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:6858:*) A4 -> I: nm4,c4(K:6858:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:6872:*) A3 -> I: nm3,c3(K:6872:*) |
ATTACK 93 -- (Id: 7148) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6877:*), nm4, c4(K:6875:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6875:*)).out(nm4,c4(K:6875:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6877:*)).out(nm3,c3(K:6877:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:6875:*) A4 -> I: nm4,c4(K:6875:*) I -> A3: c3(K:6877:*) A3 -> I: nm3,c3(K:6877:*) |
ATTACK 94 -- (Id: 7153) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6881:*), nm3, c3(K:6875:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6881:*)).out(nm4,c4(K:6881:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6875:*)).out(nm3,c3(K:6875:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:6875:*) A3 -> I: nm3,c3(K:6875:*) I -> A4: c4(K:6881:*) A4 -> I: nm4,c4(K:6881:*) |
ATTACK 95 -- (Id: 7161) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6887:*), {A3,na4}k!10, nm3, c3(K:6856:*), {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6887:*)).out(nm4,c4(K:6887:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6856:*)).out(nm3,c3(K:6856:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:6856:*) A3 -> I: nm3,c3(K:6856:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:6887:*) A4 -> I: nm4,c4(K:6887:*) I -> B2: {A3,na4}k!10 |
ATTACK 96 -- (Id: 7165) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6891:*), {A3,na4}k!10, nm3, c3(K:6856:*), {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6891:*)).out(nm4,c4(K:6891:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6856:*)).out(nm3,c3(K:6856:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:6856:*) A3 -> I: nm3,c3(K:6856:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:6891:*) A4 -> I: nm4,c4(K:6891:*) |
ATTACK 97 -- (Id: 7171) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:6885:*), nm3, c3(K:6856:*), {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6885:*)).out(nm4,c4(K:6885:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6856:*)).out(nm3,c3(K:6856:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:6856:*) A3 -> I: nm3,c3(K:6856:*) I -> A4: c4(K:6885:*) A4 -> I: nm4,c4(K:6885:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 98 -- (Id: 7179) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:6900:*), nm4, c4(K:6856:*), {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6856:*)).out(nm4,c4(K:6856:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6900:*)).out(nm3,c3(K:6900:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:6856:*) A4 -> I: nm4,c4(K:6856:*) I -> A3: c3(K:6900:*) A3 -> I: nm3,c3(K:6900:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 99 -- (Id: 7185) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6907:*), {A3,na4}k!10, nm4, c4(K:6856:*), {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6856:*)).out(nm4,c4(K:6856:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6907:*)).out(nm3,c3(K:6907:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:6856:*) A4 -> I: nm4,c4(K:6856:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:6907:*) A3 -> I: nm3,c3(K:6907:*) I -> B2: {A3,na4}k!10 |
ATTACK 100 -- (Id: 7189) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6911:*), {A3,na4}k!10, nm4, c4(K:6856:*), {A3,na4}kss1, c2(K:6361:*), {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6856:*)).out(nm4,c4(K:6856:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6911:*)).out(nm3,c3(K:6911:*))] B2: () [in(m2(K:6361:*),c2(K:6361:*)).out(B2,c2(K:6361:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> B2: m2(K:6361:*),c2(K:6361:*) B2 -> I: B2,c2(K:6361:*) I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:6856:*) A4 -> I: nm4,c4(K:6856:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:6911:*) A3 -> I: nm3,c3(K:6911:*) |
ATTACK 101 -- (Id: 7201) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6922:*), nm4, c4(K:6920:*), c2(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6920:*)).out(nm4,c4(K:6920:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6922:*)).out(nm3,c3(K:6922:*))] B2: () [in(m2(K:6917:*),c2(K:6917:*)).out(B2,c2(K:6917:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6917:*),c2(K:6917:*) B2 -> I: B2,c2(K:6917:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:6920:*) A4 -> I: nm4,c4(K:6920:*) I -> A3: c3(K:6922:*) A3 -> I: nm3,c3(K:6922:*) |
ATTACK 102 -- (Id: 7206) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6926:*), nm3, c3(K:6920:*), c2(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6926:*)).out(nm4,c4(K:6926:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6920:*)).out(nm3,c3(K:6920:*))] B2: () [in(m2(K:6917:*),c2(K:6917:*)).out(B2,c2(K:6917:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6917:*),c2(K:6917:*) B2 -> I: B2,c2(K:6917:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:6920:*) A3 -> I: nm3,c3(K:6920:*) I -> A4: c4(K:6926:*) A4 -> I: nm4,c4(K:6926:*) |
ATTACK 103 -- (Id: 7212) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6931:*), nm4, c4(K:6919:*), c2(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6919:*)).out(nm4,c4(K:6919:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6931:*)).out(nm3,c3(K:6931:*))] B2: () [in(m2(K:6917:*),c2(K:6917:*)).out(B2,c2(K:6917:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6917:*),c2(K:6917:*) B2 -> I: B2,c2(K:6917:*) I -> A4: c4(K:6919:*) A4 -> I: nm4,c4(K:6919:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:6931:*) A3 -> I: nm3,c3(K:6931:*) |
ATTACK 104 -- (Id: 7216) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6930:*), nm4, c4(K:6919:*), c2(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6919:*)).out(nm4,c4(K:6919:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6930:*)).out(nm3,c3(K:6930:*))] B2: () [in(m2(K:6917:*),c2(K:6917:*)).out(B2,c2(K:6917:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6917:*),c2(K:6917:*) B2 -> I: B2,c2(K:6917:*) I -> A4: c4(K:6919:*) A4 -> I: nm4,c4(K:6919:*) I -> A3: c3(K:6930:*) A3 -> I: nm3,c3(K:6930:*) I -> B2: {A4,na3}k!10 |
ATTACK 105 -- (Id: 7222) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6938:*), nm3, c3(K:6919:*), c2(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6938:*)).out(nm4,c4(K:6938:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6919:*)).out(nm3,c3(K:6919:*))] B2: () [in(m2(K:6917:*),c2(K:6917:*)).out(B2,c2(K:6917:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6917:*),c2(K:6917:*) B2 -> I: B2,c2(K:6917:*) I -> A3: c3(K:6919:*) A3 -> I: nm3,c3(K:6919:*) I -> A4: c4(K:6938:*) A4 -> I: nm4,c4(K:6938:*) I -> B2: {A4,na3}k!10 |
ATTACK 106 -- (Id: 7226) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6942:*), nm3, c3(K:6919:*), c2(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6942:*)).out(nm4,c4(K:6942:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6919:*)).out(nm3,c3(K:6919:*))] B2: () [in(m2(K:6917:*),c2(K:6917:*)).out(B2,c2(K:6917:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:6917:*),c2(K:6917:*) B2 -> I: B2,c2(K:6917:*) I -> A3: c3(K:6919:*) A3 -> I: nm3,c3(K:6919:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:6942:*) A4 -> I: nm4,c4(K:6942:*) |
ATTACK 107 -- (Id: 7234) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6949:*), c2(K:6946:*), nm4, c4(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6917:*)).out(nm4,c4(K:6917:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6949:*)).out(nm3,c3(K:6949:*))] B2: () [in(m2(K:6946:*),c2(K:6946:*)).out(B2,c2(K:6946:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6917:*) A4 -> I: nm4,c4(K:6917:*) I -> B2: m2(K:6946:*),c2(K:6946:*) B2 -> I: B2,c2(K:6946:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:6949:*) A3 -> I: nm3,c3(K:6949:*) |
ATTACK 108 -- (Id: 7238) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6948:*), c2(K:6946:*), nm4, c4(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6917:*)).out(nm4,c4(K:6917:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6948:*)).out(nm3,c3(K:6948:*))] B2: () [in(m2(K:6946:*),c2(K:6946:*)).out(B2,c2(K:6946:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6917:*) A4 -> I: nm4,c4(K:6917:*) I -> B2: m2(K:6946:*),c2(K:6946:*) B2 -> I: B2,c2(K:6946:*) I -> A3: c3(K:6948:*) A3 -> I: nm3,c3(K:6948:*) I -> B2: {A4,na3}k!10 |
ATTACK 109 -- (Id: 7244) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6956:*), nm3, c3(K:6946:*), nm4, c4(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6917:*)).out(nm4,c4(K:6917:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6946:*)).out(nm3,c3(K:6946:*))] B2: () [in(m2(K:6956:*),c2(K:6956:*)).out(B2,c2(K:6956:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6917:*) A4 -> I: nm4,c4(K:6917:*) I -> A3: c3(K:6946:*) A3 -> I: nm3,c3(K:6946:*) I -> B2: m2(K:6956:*),c2(K:6956:*) B2 -> I: B2,c2(K:6956:*) I -> B2: {A4,na3}k!10 |
ATTACK 110 -- (Id: 7252) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:6963:*), nm4, c4(K:6961:*), nm3, c3(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6961:*)).out(nm4,c4(K:6961:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6917:*)).out(nm3,c3(K:6917:*))] B2: () [in(m2(K:6963:*),c2(K:6963:*)).out(B2,c2(K:6963:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6917:*) A3 -> I: nm3,c3(K:6917:*) I -> A4: c4(K:6961:*) A4 -> I: nm4,c4(K:6961:*) I -> B2: m2(K:6963:*),c2(K:6963:*) B2 -> I: B2,c2(K:6963:*) I -> B2: {A4,na3}k!10 |
ATTACK 111 -- (Id: 7258) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6969:*), c2(K:6961:*), nm3, c3(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6969:*)).out(nm4,c4(K:6969:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6917:*)).out(nm3,c3(K:6917:*))] B2: () [in(m2(K:6961:*),c2(K:6961:*)).out(B2,c2(K:6961:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6917:*) A3 -> I: nm3,c3(K:6917:*) I -> B2: m2(K:6961:*),c2(K:6961:*) B2 -> I: B2,c2(K:6961:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:6969:*) A4 -> I: nm4,c4(K:6969:*) |
ATTACK 112 -- (Id: 7262) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6968:*), c2(K:6961:*), nm3, c3(K:6917:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6968:*)).out(nm4,c4(K:6968:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6917:*)).out(nm3,c3(K:6917:*))] B2: () [in(m2(K:6961:*),c2(K:6961:*)).out(B2,c2(K:6961:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6917:*) A3 -> I: nm3,c3(K:6917:*) I -> B2: m2(K:6961:*),c2(K:6961:*) B2 -> I: B2,c2(K:6961:*) I -> A4: c4(K:6968:*) A4 -> I: nm4,c4(K:6968:*) I -> B2: {A4,na3}k!10 |
ATTACK 113 -- (Id: 7272) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6981:*), nm4, c4(K:6979:*), {A4,na3}k!10, c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6979:*)).out(nm4,c4(K:6979:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6981:*)).out(nm3,c3(K:6981:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:6979:*) A4 -> I: nm4,c4(K:6979:*) I -> A3: c3(K:6981:*) A3 -> I: nm3,c3(K:6981:*) |
ATTACK 114 -- (Id: 7277) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6985:*), nm3, c3(K:6979:*), {A4,na3}k!10, c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6985:*)).out(nm4,c4(K:6985:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6979:*)).out(nm3,c3(K:6979:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:6979:*) A3 -> I: nm3,c3(K:6979:*) I -> A4: c4(K:6985:*) A4 -> I: nm4,c4(K:6985:*) |
ATTACK 115 -- (Id: 7283) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6990:*), nm4, c4(K:6978:*), {A4,na3}k!10, c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6978:*)).out(nm4,c4(K:6978:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6990:*)).out(nm3,c3(K:6990:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6978:*) A4 -> I: nm4,c4(K:6978:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:6990:*) A3 -> I: nm3,c3(K:6990:*) |
ATTACK 116 -- (Id: 7287) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:6989:*), nm4, c4(K:6978:*), {A4,na3}k!10, c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6978:*)).out(nm4,c4(K:6978:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6989:*)).out(nm3,c3(K:6989:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:6978:*) A4 -> I: nm4,c4(K:6978:*) I -> A3: c3(K:6989:*) A3 -> I: nm3,c3(K:6989:*) I -> B2: {A4,na3}k!10 |
ATTACK 117 -- (Id: 7293) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:6997:*), nm3, c3(K:6978:*), {A4,na3}k!10, c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6997:*)).out(nm4,c4(K:6997:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6978:*)).out(nm3,c3(K:6978:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6978:*) A3 -> I: nm3,c3(K:6978:*) I -> A4: c4(K:6997:*) A4 -> I: nm4,c4(K:6997:*) I -> B2: {A4,na3}k!10 |
ATTACK 118 -- (Id: 7297) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7001:*), nm3, c3(K:6978:*), {A4,na3}k!10, c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7001:*)).out(nm4,c4(K:7001:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6978:*)).out(nm3,c3(K:6978:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:6978:*) A3 -> I: nm3,c3(K:6978:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:7001:*) A4 -> I: nm4,c4(K:7001:*) |
ATTACK 119 -- (Id: 7305) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7008:*), {A4,na3}k!10, nm4, c4(K:6976:*), c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6976:*)).out(nm4,c4(K:6976:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7008:*)).out(nm3,c3(K:7008:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> A4: c4(K:6976:*) A4 -> I: nm4,c4(K:6976:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:7008:*) A3 -> I: nm3,c3(K:7008:*) |
ATTACK 120 -- (Id: 7309) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7007:*), {A4,na3}k!10, nm4, c4(K:6976:*), c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6976:*)).out(nm4,c4(K:6976:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7007:*)).out(nm3,c3(K:7007:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> A4: c4(K:6976:*) A4 -> I: nm4,c4(K:6976:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:7007:*) A3 -> I: nm3,c3(K:7007:*) I -> B2: {A4,na3}k!10 |
ATTACK 121 -- (Id: 7315) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:7005:*), nm4, c4(K:6976:*), c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6976:*)).out(nm4,c4(K:6976:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7005:*)).out(nm3,c3(K:7005:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> A4: c4(K:6976:*) A4 -> I: nm4,c4(K:6976:*) I -> A3: c3(K:7005:*) A3 -> I: nm3,c3(K:7005:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 122 -- (Id: 7323) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:7020:*), nm3, c3(K:6976:*), c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7020:*)).out(nm4,c4(K:7020:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6976:*)).out(nm3,c3(K:6976:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> A3: c3(K:6976:*) A3 -> I: nm3,c3(K:6976:*) I -> A4: c4(K:7020:*) A4 -> I: nm4,c4(K:7020:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 123 -- (Id: 7329) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7027:*), {A4,na3}k!10, nm3, c3(K:6976:*), c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7027:*)).out(nm4,c4(K:7027:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6976:*)).out(nm3,c3(K:6976:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> A3: c3(K:6976:*) A3 -> I: nm3,c3(K:6976:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:7027:*) A4 -> I: nm4,c4(K:7027:*) I -> B2: {A4,na3}k!10 |
ATTACK 124 -- (Id: 7333) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7031:*), {A4,na3}k!10, nm3, c3(K:6976:*), c2(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7031:*)).out(nm4,c4(K:7031:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6976:*)).out(nm3,c3(K:6976:*))] B2: () [in(m2(K:6915:*),c2(K:6915:*)).out(B2,c2(K:6915:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:6915:*),c2(K:6915:*) B2 -> I: B2,c2(K:6915:*) I -> A3: c3(K:6976:*) A3 -> I: nm3,c3(K:6976:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:7031:*) A4 -> I: nm4,c4(K:7031:*) |
ATTACK 125 -- (Id: 7343) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7040:*), {A4,na3}k!10, c2(K:7035:*), nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7040:*)).out(nm3,c3(K:7040:*))] B2: () [in(m2(K:7035:*),c2(K:7035:*)).out(B2,c2(K:7035:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> B2: m2(K:7035:*),c2(K:7035:*) B2 -> I: B2,c2(K:7035:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:7040:*) A3 -> I: nm3,c3(K:7040:*) |
ATTACK 126 -- (Id: 7347) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7039:*), {A4,na3}k!10, c2(K:7035:*), nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7039:*)).out(nm3,c3(K:7039:*))] B2: () [in(m2(K:7035:*),c2(K:7035:*)).out(B2,c2(K:7035:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> B2: m2(K:7035:*),c2(K:7035:*) B2 -> I: B2,c2(K:7035:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:7039:*) A3 -> I: nm3,c3(K:7039:*) I -> B2: {A4,na3}k!10 |
ATTACK 127 -- (Id: 7353) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:7037:*), c2(K:7035:*), nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7037:*)).out(nm3,c3(K:7037:*))] B2: () [in(m2(K:7035:*),c2(K:7035:*)).out(B2,c2(K:7035:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> B2: m2(K:7035:*),c2(K:7035:*) B2 -> I: B2,c2(K:7035:*) I -> A3: c3(K:7037:*) A3 -> I: nm3,c3(K:7037:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 128 -- (Id: 7361) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7055:*), c2(K:7052:*), {A4,na3}k!10, nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7055:*)).out(nm3,c3(K:7055:*))] B2: () [in(m2(K:7052:*),c2(K:7052:*)).out(B2,c2(K:7052:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:7052:*),c2(K:7052:*) B2 -> I: B2,c2(K:7052:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:7055:*) A3 -> I: nm3,c3(K:7055:*) |
ATTACK 129 -- (Id: 7365) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7054:*), c2(K:7052:*), {A4,na3}k!10, nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7054:*)).out(nm3,c3(K:7054:*))] B2: () [in(m2(K:7052:*),c2(K:7052:*)).out(B2,c2(K:7052:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:7052:*),c2(K:7052:*) B2 -> I: B2,c2(K:7052:*) I -> A3: c3(K:7054:*) A3 -> I: nm3,c3(K:7054:*) I -> B2: {A4,na3}k!10 |
ATTACK 130 -- (Id: 7371) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7062:*), nm3, c3(K:7052:*), {A4,na3}k!10, nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7052:*)).out(nm3,c3(K:7052:*))] B2: () [in(m2(K:7062:*),c2(K:7062:*)).out(B2,c2(K:7062:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:7052:*) A3 -> I: nm3,c3(K:7052:*) I -> B2: m2(K:7062:*),c2(K:7062:*) B2 -> I: B2,c2(K:7062:*) I -> B2: {A4,na3}k!10 |
ATTACK 131 -- (Id: 7379) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7069:*), {A4,na3}k!10, nm3, c3(K:7035:*), nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7035:*)).out(nm3,c3(K:7035:*))] B2: () [in(m2(K:7069:*),c2(K:7069:*)).out(B2,c2(K:7069:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> A3: c3(K:7035:*) A3 -> I: nm3,c3(K:7035:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:7069:*),c2(K:7069:*) B2 -> I: B2,c2(K:7069:*) I -> B2: {A4,na3}k!10 |
ATTACK 132 -- (Id: 7385) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:7067:*), nm3, c3(K:7035:*), nm4, c4(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:6915:*)).out(nm4,c4(K:6915:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7035:*)).out(nm3,c3(K:7035:*))] B2: () [in(m2(K:7067:*),c2(K:7067:*)).out(B2,c2(K:7067:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:6915:*) A4 -> I: nm4,c4(K:6915:*) I -> A3: c3(K:7035:*) A3 -> I: nm3,c3(K:7035:*) I -> B2: m2(K:7067:*),c2(K:7067:*) B2 -> I: B2,c2(K:7067:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 133 -- (Id: 7395) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:7081:*), nm4, c4(K:7079:*), nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7079:*)).out(nm4,c4(K:7079:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7081:*),c2(K:7081:*)).out(B2,c2(K:7081:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> A4: c4(K:7079:*) A4 -> I: nm4,c4(K:7079:*) I -> B2: m2(K:7081:*),c2(K:7081:*) B2 -> I: B2,c2(K:7081:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 134 -- (Id: 7401) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7088:*), {A4,na3}k!10, nm4, c4(K:7079:*), nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7079:*)).out(nm4,c4(K:7079:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7088:*),c2(K:7088:*)).out(B2,c2(K:7088:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> A4: c4(K:7079:*) A4 -> I: nm4,c4(K:7079:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:7088:*),c2(K:7088:*) B2 -> I: B2,c2(K:7088:*) I -> B2: {A4,na3}k!10 |
ATTACK 135 -- (Id: 7409) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:7093:*), c2(K:7079:*), nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7093:*)).out(nm4,c4(K:7093:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7079:*),c2(K:7079:*)).out(B2,c2(K:7079:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> B2: m2(K:7079:*),c2(K:7079:*) B2 -> I: B2,c2(K:7079:*) I -> A4: c4(K:7093:*) A4 -> I: nm4,c4(K:7093:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 136 -- (Id: 7415) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7100:*), {A4,na3}k!10, c2(K:7079:*), nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7100:*)).out(nm4,c4(K:7100:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7079:*),c2(K:7079:*)).out(B2,c2(K:7079:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> B2: m2(K:7079:*),c2(K:7079:*) B2 -> I: B2,c2(K:7079:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:7100:*) A4 -> I: nm4,c4(K:7100:*) I -> B2: {A4,na3}k!10 |
ATTACK 137 -- (Id: 7419) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7104:*), {A4,na3}k!10, c2(K:7079:*), nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7104:*)).out(nm4,c4(K:7104:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7079:*),c2(K:7079:*)).out(B2,c2(K:7079:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> B2: m2(K:7079:*),c2(K:7079:*) B2 -> I: B2,c2(K:7079:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:7104:*) A4 -> I: nm4,c4(K:7104:*) |
ATTACK 138 -- (Id: 7427) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7111:*), c2(K:7108:*), {A4,na3}k!10, nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7111:*)).out(nm4,c4(K:7111:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7108:*),c2(K:7108:*)).out(B2,c2(K:7108:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:7108:*),c2(K:7108:*) B2 -> I: B2,c2(K:7108:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:7111:*) A4 -> I: nm4,c4(K:7111:*) |
ATTACK 139 -- (Id: 7431) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7110:*), c2(K:7108:*), {A4,na3}k!10, nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7110:*)).out(nm4,c4(K:7110:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7108:*),c2(K:7108:*)).out(B2,c2(K:7108:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:7108:*),c2(K:7108:*) B2 -> I: B2,c2(K:7108:*) I -> A4: c4(K:7110:*) A4 -> I: nm4,c4(K:7110:*) I -> B2: {A4,na3}k!10 |
ATTACK 140 -- (Id: 7437) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A4 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7118:*), nm4, c4(K:7108:*), {A4,na3}k!10, nm3, c3(K:6915:*), {A4,na3}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7108:*)).out(nm4,c4(K:7108:*))] A3: () [out(A3,{na3}k!20).in(c3(K:6915:*)).out(nm3,c3(K:6915:*))] B2: () [in(m2(K:7118:*),c2(K:7118:*)).out(B2,c2(K:7118:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!20).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A4,{na3}k!20 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:6915:*) A3 -> I: nm3,c3(K:6915:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:7108:*) A4 -> I: nm4,c4(K:7108:*) I -> B2: m2(K:7118:*),c2(K:7118:*) B2 -> I: B2,c2(K:7118:*) I -> B2: {A4,na3}k!10 |
ATTACK 141 -- (Id: 7449) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7130:*), nm4, c4(K:7128:*), c2(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7128:*)).out(nm4,c4(K:7128:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7130:*)).out(nm3,c3(K:7130:*))] B2: () [in(m2(K:7125:*),c2(K:7125:*)).out(B2,c2(K:7125:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7125:*),c2(K:7125:*) B2 -> I: B2,c2(K:7125:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:7128:*) A4 -> I: nm4,c4(K:7128:*) I -> A3: c3(K:7130:*) A3 -> I: nm3,c3(K:7130:*) |
ATTACK 142 -- (Id: 7454) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7134:*), nm3, c3(K:7128:*), c2(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7134:*)).out(nm4,c4(K:7134:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7128:*)).out(nm3,c3(K:7128:*))] B2: () [in(m2(K:7125:*),c2(K:7125:*)).out(B2,c2(K:7125:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7125:*),c2(K:7125:*) B2 -> I: B2,c2(K:7125:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:7128:*) A3 -> I: nm3,c3(K:7128:*) I -> A4: c4(K:7134:*) A4 -> I: nm4,c4(K:7134:*) |
ATTACK 143 -- (Id: 7460) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7139:*), nm4, c4(K:7127:*), c2(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7127:*)).out(nm4,c4(K:7127:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7139:*)).out(nm3,c3(K:7139:*))] B2: () [in(m2(K:7125:*),c2(K:7125:*)).out(B2,c2(K:7125:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7125:*),c2(K:7125:*) B2 -> I: B2,c2(K:7125:*) I -> A4: c4(K:7127:*) A4 -> I: nm4,c4(K:7127:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:7139:*) A3 -> I: nm3,c3(K:7139:*) |
ATTACK 144 -- (Id: 7464) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7138:*), nm4, c4(K:7127:*), c2(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7127:*)).out(nm4,c4(K:7127:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7138:*)).out(nm3,c3(K:7138:*))] B2: () [in(m2(K:7125:*),c2(K:7125:*)).out(B2,c2(K:7125:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7125:*),c2(K:7125:*) B2 -> I: B2,c2(K:7125:*) I -> A4: c4(K:7127:*) A4 -> I: nm4,c4(K:7127:*) I -> A3: c3(K:7138:*) A3 -> I: nm3,c3(K:7138:*) I -> B2: {A3,na4}k!10 |
ATTACK 145 -- (Id: 7470) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7146:*), nm3, c3(K:7127:*), c2(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7146:*)).out(nm4,c4(K:7146:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7127:*)).out(nm3,c3(K:7127:*))] B2: () [in(m2(K:7125:*),c2(K:7125:*)).out(B2,c2(K:7125:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7125:*),c2(K:7125:*) B2 -> I: B2,c2(K:7125:*) I -> A3: c3(K:7127:*) A3 -> I: nm3,c3(K:7127:*) I -> A4: c4(K:7146:*) A4 -> I: nm4,c4(K:7146:*) I -> B2: {A3,na4}k!10 |
ATTACK 146 -- (Id: 7474) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7150:*), nm3, c3(K:7127:*), c2(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7150:*)).out(nm4,c4(K:7150:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7127:*)).out(nm3,c3(K:7127:*))] B2: () [in(m2(K:7125:*),c2(K:7125:*)).out(B2,c2(K:7125:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7125:*),c2(K:7125:*) B2 -> I: B2,c2(K:7125:*) I -> A3: c3(K:7127:*) A3 -> I: nm3,c3(K:7127:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:7150:*) A4 -> I: nm4,c4(K:7150:*) |
ATTACK 147 -- (Id: 7482) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7157:*), c2(K:7154:*), nm4, c4(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7125:*)).out(nm4,c4(K:7125:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7157:*)).out(nm3,c3(K:7157:*))] B2: () [in(m2(K:7154:*),c2(K:7154:*)).out(B2,c2(K:7154:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7125:*) A4 -> I: nm4,c4(K:7125:*) I -> B2: m2(K:7154:*),c2(K:7154:*) B2 -> I: B2,c2(K:7154:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:7157:*) A3 -> I: nm3,c3(K:7157:*) |
ATTACK 148 -- (Id: 7486) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7156:*), c2(K:7154:*), nm4, c4(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7125:*)).out(nm4,c4(K:7125:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7156:*)).out(nm3,c3(K:7156:*))] B2: () [in(m2(K:7154:*),c2(K:7154:*)).out(B2,c2(K:7154:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7125:*) A4 -> I: nm4,c4(K:7125:*) I -> B2: m2(K:7154:*),c2(K:7154:*) B2 -> I: B2,c2(K:7154:*) I -> A3: c3(K:7156:*) A3 -> I: nm3,c3(K:7156:*) I -> B2: {A3,na4}k!10 |
ATTACK 149 -- (Id: 7492) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7164:*), nm3, c3(K:7154:*), nm4, c4(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7125:*)).out(nm4,c4(K:7125:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7154:*)).out(nm3,c3(K:7154:*))] B2: () [in(m2(K:7164:*),c2(K:7164:*)).out(B2,c2(K:7164:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7125:*) A4 -> I: nm4,c4(K:7125:*) I -> A3: c3(K:7154:*) A3 -> I: nm3,c3(K:7154:*) I -> B2: m2(K:7164:*),c2(K:7164:*) B2 -> I: B2,c2(K:7164:*) I -> B2: {A3,na4}k!10 |
ATTACK 150 -- (Id: 7500) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7171:*), nm4, c4(K:7169:*), nm3, c3(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7169:*)).out(nm4,c4(K:7169:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7125:*)).out(nm3,c3(K:7125:*))] B2: () [in(m2(K:7171:*),c2(K:7171:*)).out(B2,c2(K:7171:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7125:*) A3 -> I: nm3,c3(K:7125:*) I -> A4: c4(K:7169:*) A4 -> I: nm4,c4(K:7169:*) I -> B2: m2(K:7171:*),c2(K:7171:*) B2 -> I: B2,c2(K:7171:*) I -> B2: {A3,na4}k!10 |
ATTACK 151 -- (Id: 7506) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7177:*), c2(K:7169:*), nm3, c3(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7177:*)).out(nm4,c4(K:7177:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7125:*)).out(nm3,c3(K:7125:*))] B2: () [in(m2(K:7169:*),c2(K:7169:*)).out(B2,c2(K:7169:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7125:*) A3 -> I: nm3,c3(K:7125:*) I -> B2: m2(K:7169:*),c2(K:7169:*) B2 -> I: B2,c2(K:7169:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:7177:*) A4 -> I: nm4,c4(K:7177:*) |
ATTACK 152 -- (Id: 7510) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7176:*), c2(K:7169:*), nm3, c3(K:7125:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7176:*)).out(nm4,c4(K:7176:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7125:*)).out(nm3,c3(K:7125:*))] B2: () [in(m2(K:7169:*),c2(K:7169:*)).out(B2,c2(K:7169:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7125:*) A3 -> I: nm3,c3(K:7125:*) I -> B2: m2(K:7169:*),c2(K:7169:*) B2 -> I: B2,c2(K:7169:*) I -> A4: c4(K:7176:*) A4 -> I: nm4,c4(K:7176:*) I -> B2: {A3,na4}k!10 |
ATTACK 153 -- (Id: 7520) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7189:*), nm4, c4(K:7187:*), {A3,na4}k!10, c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7187:*)).out(nm4,c4(K:7187:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7189:*)).out(nm3,c3(K:7189:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:7187:*) A4 -> I: nm4,c4(K:7187:*) I -> A3: c3(K:7189:*) A3 -> I: nm3,c3(K:7189:*) |
ATTACK 154 -- (Id: 7525) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7193:*), nm3, c3(K:7187:*), {A3,na4}k!10, c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7193:*)).out(nm4,c4(K:7193:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7187:*)).out(nm3,c3(K:7187:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:7187:*) A3 -> I: nm3,c3(K:7187:*) I -> A4: c4(K:7193:*) A4 -> I: nm4,c4(K:7193:*) |
ATTACK 155 -- (Id: 7531) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7198:*), nm4, c4(K:7186:*), {A3,na4}k!10, c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7186:*)).out(nm4,c4(K:7186:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7198:*)).out(nm3,c3(K:7198:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7186:*) A4 -> I: nm4,c4(K:7186:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:7198:*) A3 -> I: nm3,c3(K:7198:*) |
ATTACK 156 -- (Id: 7535) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7197:*), nm4, c4(K:7186:*), {A3,na4}k!10, c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7186:*)).out(nm4,c4(K:7186:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7197:*)).out(nm3,c3(K:7197:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7186:*) A4 -> I: nm4,c4(K:7186:*) I -> A3: c3(K:7197:*) A3 -> I: nm3,c3(K:7197:*) I -> B2: {A3,na4}k!10 |
ATTACK 157 -- (Id: 7541) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7205:*), nm3, c3(K:7186:*), {A3,na4}k!10, c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7205:*)).out(nm4,c4(K:7205:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7186:*)).out(nm3,c3(K:7186:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7186:*) A3 -> I: nm3,c3(K:7186:*) I -> A4: c4(K:7205:*) A4 -> I: nm4,c4(K:7205:*) I -> B2: {A3,na4}k!10 |
ATTACK 158 -- (Id: 7545) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7209:*), nm3, c3(K:7186:*), {A3,na4}k!10, c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7209:*)).out(nm4,c4(K:7209:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7186:*)).out(nm3,c3(K:7186:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7186:*) A3 -> I: nm3,c3(K:7186:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:7209:*) A4 -> I: nm4,c4(K:7209:*) |
ATTACK 159 -- (Id: 7553) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7216:*), {A3,na4}k!10, nm4, c4(K:7184:*), c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7184:*)).out(nm4,c4(K:7184:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7216:*)).out(nm3,c3(K:7216:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> A4: c4(K:7184:*) A4 -> I: nm4,c4(K:7184:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:7216:*) A3 -> I: nm3,c3(K:7216:*) |
ATTACK 160 -- (Id: 7557) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7215:*), {A3,na4}k!10, nm4, c4(K:7184:*), c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7184:*)).out(nm4,c4(K:7184:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7215:*)).out(nm3,c3(K:7215:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> A4: c4(K:7184:*) A4 -> I: nm4,c4(K:7184:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7215:*) A3 -> I: nm3,c3(K:7215:*) I -> B2: {A3,na4}k!10 |
ATTACK 161 -- (Id: 7563) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:7213:*), nm4, c4(K:7184:*), c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7184:*)).out(nm4,c4(K:7184:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7213:*)).out(nm3,c3(K:7213:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> A4: c4(K:7184:*) A4 -> I: nm4,c4(K:7184:*) I -> A3: c3(K:7213:*) A3 -> I: nm3,c3(K:7213:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 162 -- (Id: 7571) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:7228:*), nm3, c3(K:7184:*), c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7228:*)).out(nm4,c4(K:7228:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7184:*)).out(nm3,c3(K:7184:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> A3: c3(K:7184:*) A3 -> I: nm3,c3(K:7184:*) I -> A4: c4(K:7228:*) A4 -> I: nm4,c4(K:7228:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 163 -- (Id: 7577) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7235:*), {A3,na4}k!10, nm3, c3(K:7184:*), c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7235:*)).out(nm4,c4(K:7235:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7184:*)).out(nm3,c3(K:7184:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> A3: c3(K:7184:*) A3 -> I: nm3,c3(K:7184:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7235:*) A4 -> I: nm4,c4(K:7235:*) I -> B2: {A3,na4}k!10 |
ATTACK 164 -- (Id: 7581) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7239:*), {A3,na4}k!10, nm3, c3(K:7184:*), c2(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7239:*)).out(nm4,c4(K:7239:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7184:*)).out(nm3,c3(K:7184:*))] B2: () [in(m2(K:7123:*),c2(K:7123:*)).out(B2,c2(K:7123:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:7123:*),c2(K:7123:*) B2 -> I: B2,c2(K:7123:*) I -> A3: c3(K:7184:*) A3 -> I: nm3,c3(K:7184:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:7239:*) A4 -> I: nm4,c4(K:7239:*) |
ATTACK 165 -- (Id: 7591) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7248:*), {A3,na4}k!10, c2(K:7243:*), nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7248:*)).out(nm3,c3(K:7248:*))] B2: () [in(m2(K:7243:*),c2(K:7243:*)).out(B2,c2(K:7243:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> B2: m2(K:7243:*),c2(K:7243:*) B2 -> I: B2,c2(K:7243:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:7248:*) A3 -> I: nm3,c3(K:7248:*) |
ATTACK 166 -- (Id: 7595) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7247:*), {A3,na4}k!10, c2(K:7243:*), nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7247:*)).out(nm3,c3(K:7247:*))] B2: () [in(m2(K:7243:*),c2(K:7243:*)).out(B2,c2(K:7243:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> B2: m2(K:7243:*),c2(K:7243:*) B2 -> I: B2,c2(K:7243:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7247:*) A3 -> I: nm3,c3(K:7247:*) I -> B2: {A3,na4}k!10 |
ATTACK 167 -- (Id: 7601) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:7245:*), c2(K:7243:*), nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7245:*)).out(nm3,c3(K:7245:*))] B2: () [in(m2(K:7243:*),c2(K:7243:*)).out(B2,c2(K:7243:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> B2: m2(K:7243:*),c2(K:7243:*) B2 -> I: B2,c2(K:7243:*) I -> A3: c3(K:7245:*) A3 -> I: nm3,c3(K:7245:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 168 -- (Id: 7609) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7263:*), c2(K:7260:*), {A3,na4}k!10, nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7263:*)).out(nm3,c3(K:7263:*))] B2: () [in(m2(K:7260:*),c2(K:7260:*)).out(B2,c2(K:7260:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7260:*),c2(K:7260:*) B2 -> I: B2,c2(K:7260:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:7263:*) A3 -> I: nm3,c3(K:7263:*) |
ATTACK 169 -- (Id: 7613) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:7262:*), c2(K:7260:*), {A3,na4}k!10, nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7262:*)).out(nm3,c3(K:7262:*))] B2: () [in(m2(K:7260:*),c2(K:7260:*)).out(B2,c2(K:7260:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7260:*),c2(K:7260:*) B2 -> I: B2,c2(K:7260:*) I -> A3: c3(K:7262:*) A3 -> I: nm3,c3(K:7262:*) I -> B2: {A3,na4}k!10 |
ATTACK 170 -- (Id: 7619) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7270:*), nm3, c3(K:7260:*), {A3,na4}k!10, nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7260:*)).out(nm3,c3(K:7260:*))] B2: () [in(m2(K:7270:*),c2(K:7270:*)).out(B2,c2(K:7270:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:7260:*) A3 -> I: nm3,c3(K:7260:*) I -> B2: m2(K:7270:*),c2(K:7270:*) B2 -> I: B2,c2(K:7270:*) I -> B2: {A3,na4}k!10 |
ATTACK 171 -- (Id: 7627) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7277:*), {A3,na4}k!10, nm3, c3(K:7243:*), nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7243:*)).out(nm3,c3(K:7243:*))] B2: () [in(m2(K:7277:*),c2(K:7277:*)).out(B2,c2(K:7277:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> A3: c3(K:7243:*) A3 -> I: nm3,c3(K:7243:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7277:*),c2(K:7277:*) B2 -> I: B2,c2(K:7277:*) I -> B2: {A3,na4}k!10 |
ATTACK 172 -- (Id: 7633) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:7275:*), nm3, c3(K:7243:*), nm4, c4(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7123:*)).out(nm4,c4(K:7123:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7243:*)).out(nm3,c3(K:7243:*))] B2: () [in(m2(K:7275:*),c2(K:7275:*)).out(B2,c2(K:7275:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:7123:*) A4 -> I: nm4,c4(K:7123:*) I -> A3: c3(K:7243:*) A3 -> I: nm3,c3(K:7243:*) I -> B2: m2(K:7275:*),c2(K:7275:*) B2 -> I: B2,c2(K:7275:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 173 -- (Id: 7643) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:7289:*), nm4, c4(K:7287:*), nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7287:*)).out(nm4,c4(K:7287:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7289:*),c2(K:7289:*)).out(B2,c2(K:7289:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> A4: c4(K:7287:*) A4 -> I: nm4,c4(K:7287:*) I -> B2: m2(K:7289:*),c2(K:7289:*) B2 -> I: B2,c2(K:7289:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 174 -- (Id: 7649) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7296:*), {A3,na4}k!10, nm4, c4(K:7287:*), nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7287:*)).out(nm4,c4(K:7287:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7296:*),c2(K:7296:*)).out(B2,c2(K:7296:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> A4: c4(K:7287:*) A4 -> I: nm4,c4(K:7287:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7296:*),c2(K:7296:*) B2 -> I: B2,c2(K:7296:*) I -> B2: {A3,na4}k!10 |
ATTACK 175 -- (Id: 7657) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:7301:*), c2(K:7287:*), nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7301:*)).out(nm4,c4(K:7301:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7287:*),c2(K:7287:*)).out(B2,c2(K:7287:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> B2: m2(K:7287:*),c2(K:7287:*) B2 -> I: B2,c2(K:7287:*) I -> A4: c4(K:7301:*) A4 -> I: nm4,c4(K:7301:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 176 -- (Id: 7663) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7308:*), {A3,na4}k!10, c2(K:7287:*), nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7308:*)).out(nm4,c4(K:7308:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7287:*),c2(K:7287:*)).out(B2,c2(K:7287:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> B2: m2(K:7287:*),c2(K:7287:*) B2 -> I: B2,c2(K:7287:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7308:*) A4 -> I: nm4,c4(K:7308:*) I -> B2: {A3,na4}k!10 |
ATTACK 177 -- (Id: 7667) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7312:*), {A3,na4}k!10, c2(K:7287:*), nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7312:*)).out(nm4,c4(K:7312:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7287:*),c2(K:7287:*)).out(B2,c2(K:7287:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> B2: m2(K:7287:*),c2(K:7287:*) B2 -> I: B2,c2(K:7287:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:7312:*) A4 -> I: nm4,c4(K:7312:*) |
ATTACK 178 -- (Id: 7675) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7319:*), c2(K:7316:*), {A3,na4}k!10, nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7319:*)).out(nm4,c4(K:7319:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7316:*),c2(K:7316:*)).out(B2,c2(K:7316:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7316:*),c2(K:7316:*) B2 -> I: B2,c2(K:7316:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:7319:*) A4 -> I: nm4,c4(K:7319:*) |
ATTACK 179 -- (Id: 7679) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:7318:*), c2(K:7316:*), {A3,na4}k!10, nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7318:*)).out(nm4,c4(K:7318:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7316:*),c2(K:7316:*)).out(B2,c2(K:7316:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:7316:*),c2(K:7316:*) B2 -> I: B2,c2(K:7316:*) I -> A4: c4(K:7318:*) A4 -> I: nm4,c4(K:7318:*) I -> B2: {A3,na4}k!10 |
ATTACK 180 -- (Id: 7685) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!20 sk3 -> k!20 sk2 -> k!10 u1 -> A3 uk1 -> k!20 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:7326:*), nm4, c4(K:7316:*), {A3,na4}k!10, nm3, c3(K:7123:*), {A3,na4}kss1, {na3}k!20, {na4}k!20, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!20).in(c4(K:7316:*)).out(nm4,c4(K:7316:*))] A3: () [out(A3,{na3}k!20).in(c3(K:7123:*)).out(nm3,c3(K:7123:*))] B2: () [in(m2(K:7326:*),c2(K:7326:*)).out(B2,c2(K:7326:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!20).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!20 A3 -> I: A3,{na3}k!20 I -> S1: A3,{na4}k!20 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:7123:*) A3 -> I: nm3,c3(K:7123:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:7316:*) A4 -> I: nm4,c4(K:7316:*) I -> B2: m2(K:7326:*),c2(K:7326:*) B2 -> I: B2,c2(K:7326:*) I -> B2: {A3,na4}k!10 |
ATTACK 181 -- (Id: 12371) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, c2(K:11647:*), nm4, c4(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11645:*)).out(nm4,c4(K:11645:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11647:*),c2(K:11647:*)).out(B2,c2(K:11647:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> A4: c4(K:11645:*) A4 -> I: nm4,c4(K:11645:*) I -> B2: m2(K:11647:*),c2(K:11647:*) B2 -> I: B2,c2(K:11647:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 182 -- (Id: 12377) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, c2(K:11647:*), nm4, c4(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11645:*)).out(nm4,c4(K:11645:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11647:*),c2(K:11647:*)).out(B2,c2(K:11647:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> A4: c4(K:11645:*) A4 -> I: nm4,c4(K:11645:*) I -> B2: m2(K:11647:*),c2(K:11647:*) B2 -> I: B2,c2(K:11647:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 183 -- (Id: 12385) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11663:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11645:*)).out(nm4,c4(K:11645:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11663:*),c2(K:11663:*)).out(B2,c2(K:11663:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> A4: c4(K:11645:*) A4 -> I: nm4,c4(K:11645:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11663:*),c2(K:11663:*) B2 -> I: B2,c2(K:11663:*) I -> B2: {A4,na3}k!10 |
ATTACK 184 -- (Id: 12391) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:11661:*), {A4,na3}kss1, nm4, c4(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11645:*)).out(nm4,c4(K:11645:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11661:*),c2(K:11661:*)).out(B2,c2(K:11661:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> A4: c4(K:11645:*) A4 -> I: nm4,c4(K:11645:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11661:*),c2(K:11661:*) B2 -> I: B2,c2(K:11661:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 185 -- (Id: 12399) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11675:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11645:*)).out(nm4,c4(K:11645:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11675:*),c2(K:11675:*)).out(B2,c2(K:11675:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> A4: c4(K:11645:*) A4 -> I: nm4,c4(K:11645:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11675:*),c2(K:11675:*) B2 -> I: B2,c2(K:11675:*) I -> B2: {A3,na4}k!10 |
ATTACK 186 -- (Id: 12405) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:11673:*), {A3,na4}kss1, nm4, c4(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11645:*)).out(nm4,c4(K:11645:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11673:*),c2(K:11673:*)).out(B2,c2(K:11673:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> A4: c4(K:11645:*) A4 -> I: nm4,c4(K:11645:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11673:*),c2(K:11673:*) B2 -> I: B2,c2(K:11673:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 187 -- (Id: 12415) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:11685:*), c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11685:*)).out(nm4,c4(K:11685:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> A4: c4(K:11685:*) A4 -> I: nm4,c4(K:11685:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 188 -- (Id: 12421) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:11685:*), c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11685:*)).out(nm4,c4(K:11685:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> A4: c4(K:11685:*) A4 -> I: nm4,c4(K:11685:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 189 -- (Id: 12429) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11701:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11701:*)).out(nm4,c4(K:11701:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:11701:*) A4 -> I: nm4,c4(K:11701:*) I -> B2: {A4,na3}k!10 |
ATTACK 190 -- (Id: 12433) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11705:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11705:*)).out(nm4,c4(K:11705:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:11705:*) A4 -> I: nm4,c4(K:11705:*) |
ATTACK 191 -- (Id: 12439) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:11699:*), {A4,na3}kss1, c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11699:*)).out(nm4,c4(K:11699:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:11699:*) A4 -> I: nm4,c4(K:11699:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 192 -- (Id: 12447) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11716:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11716:*)).out(nm4,c4(K:11716:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:11716:*) A4 -> I: nm4,c4(K:11716:*) I -> B2: {A3,na4}k!10 |
ATTACK 193 -- (Id: 12451) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11720:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11720:*)).out(nm4,c4(K:11720:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:11720:*) A4 -> I: nm4,c4(K:11720:*) |
ATTACK 194 -- (Id: 12457) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:11714:*), {A3,na4}kss1, c2(K:11645:*), nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11714:*)).out(nm4,c4(K:11714:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11645:*),c2(K:11645:*)).out(B2,c2(K:11645:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> B2: m2(K:11645:*),c2(K:11645:*) B2 -> I: B2,c2(K:11645:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:11714:*) A4 -> I: nm4,c4(K:11714:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 195 -- (Id: 12467) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11734:*), c2(K:11731:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11734:*)).out(nm4,c4(K:11734:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11731:*),c2(K:11731:*)).out(B2,c2(K:11731:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11731:*),c2(K:11731:*) B2 -> I: B2,c2(K:11731:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:11734:*) A4 -> I: nm4,c4(K:11734:*) |
ATTACK 196 -- (Id: 12471) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11733:*), c2(K:11731:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11733:*)).out(nm4,c4(K:11733:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11731:*),c2(K:11731:*)).out(B2,c2(K:11731:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11731:*),c2(K:11731:*) B2 -> I: B2,c2(K:11731:*) I -> A4: c4(K:11733:*) A4 -> I: nm4,c4(K:11733:*) I -> B2: {A4,na3}k!10 |
ATTACK 197 -- (Id: 12477) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11741:*), nm4, c4(K:11731:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11731:*)).out(nm4,c4(K:11731:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11741:*),c2(K:11741:*)).out(B2,c2(K:11741:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:11731:*) A4 -> I: nm4,c4(K:11731:*) I -> B2: m2(K:11741:*),c2(K:11741:*) B2 -> I: B2,c2(K:11741:*) I -> B2: {A4,na3}k!10 |
ATTACK 198 -- (Id: 12485) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11749:*), {A4,na3}k!10, c2(K:11729:*), {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11749:*)).out(nm4,c4(K:11749:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11729:*),c2(K:11729:*)).out(B2,c2(K:11729:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11729:*),c2(K:11729:*) B2 -> I: B2,c2(K:11729:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:11749:*) A4 -> I: nm4,c4(K:11749:*) |
ATTACK 199 -- (Id: 12489) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11748:*), {A4,na3}k!10, c2(K:11729:*), {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11748:*)).out(nm4,c4(K:11748:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11729:*),c2(K:11729:*)).out(B2,c2(K:11729:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11729:*),c2(K:11729:*) B2 -> I: B2,c2(K:11729:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:11748:*) A4 -> I: nm4,c4(K:11748:*) I -> B2: {A4,na3}k!10 |
ATTACK 200 -- (Id: 12495) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:11746:*), c2(K:11729:*), {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11746:*)).out(nm4,c4(K:11746:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11729:*),c2(K:11729:*)).out(B2,c2(K:11729:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11729:*),c2(K:11729:*) B2 -> I: B2,c2(K:11729:*) I -> A4: c4(K:11746:*) A4 -> I: nm4,c4(K:11746:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 201 -- (Id: 12503) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:11761:*), nm4, c4(K:11729:*), {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11729:*)).out(nm4,c4(K:11729:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11761:*),c2(K:11761:*)).out(B2,c2(K:11761:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:11729:*) A4 -> I: nm4,c4(K:11729:*) I -> B2: m2(K:11761:*),c2(K:11761:*) B2 -> I: B2,c2(K:11761:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 202 -- (Id: 12509) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11768:*), {A4,na3}k!10, nm4, c4(K:11729:*), {A4,na3}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11729:*)).out(nm4,c4(K:11729:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11768:*),c2(K:11768:*)).out(B2,c2(K:11768:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:11729:*) A4 -> I: nm4,c4(K:11729:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11768:*),c2(K:11768:*) B2 -> I: B2,c2(K:11768:*) I -> B2: {A4,na3}k!10 |
ATTACK 203 -- (Id: 12519) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11778:*), c2(K:11775:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11778:*)).out(nm4,c4(K:11778:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11775:*),c2(K:11775:*)).out(B2,c2(K:11775:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11775:*),c2(K:11775:*) B2 -> I: B2,c2(K:11775:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:11778:*) A4 -> I: nm4,c4(K:11778:*) |
ATTACK 204 -- (Id: 12523) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11777:*), c2(K:11775:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11777:*)).out(nm4,c4(K:11777:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11775:*),c2(K:11775:*)).out(B2,c2(K:11775:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11775:*),c2(K:11775:*) B2 -> I: B2,c2(K:11775:*) I -> A4: c4(K:11777:*) A4 -> I: nm4,c4(K:11777:*) I -> B2: {A3,na4}k!10 |
ATTACK 205 -- (Id: 12529) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11785:*), nm4, c4(K:11775:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11775:*)).out(nm4,c4(K:11775:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11785:*),c2(K:11785:*)).out(B2,c2(K:11785:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:11775:*) A4 -> I: nm4,c4(K:11775:*) I -> B2: m2(K:11785:*),c2(K:11785:*) B2 -> I: B2,c2(K:11785:*) I -> B2: {A3,na4}k!10 |
ATTACK 206 -- (Id: 12537) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11793:*), {A3,na4}k!10, c2(K:11773:*), {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11793:*)).out(nm4,c4(K:11793:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11773:*),c2(K:11773:*)).out(B2,c2(K:11773:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11773:*),c2(K:11773:*) B2 -> I: B2,c2(K:11773:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:11793:*) A4 -> I: nm4,c4(K:11793:*) |
ATTACK 207 -- (Id: 12541) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:11792:*), {A3,na4}k!10, c2(K:11773:*), {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11792:*)).out(nm4,c4(K:11792:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11773:*),c2(K:11773:*)).out(B2,c2(K:11773:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11773:*),c2(K:11773:*) B2 -> I: B2,c2(K:11773:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:11792:*) A4 -> I: nm4,c4(K:11792:*) I -> B2: {A3,na4}k!10 |
ATTACK 208 -- (Id: 12547) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:11790:*), c2(K:11773:*), {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11790:*)).out(nm4,c4(K:11790:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11773:*),c2(K:11773:*)).out(B2,c2(K:11773:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11773:*),c2(K:11773:*) B2 -> I: B2,c2(K:11773:*) I -> A4: c4(K:11790:*) A4 -> I: nm4,c4(K:11790:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 209 -- (Id: 12555) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:11805:*), nm4, c4(K:11773:*), {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11773:*)).out(nm4,c4(K:11773:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11805:*),c2(K:11805:*)).out(B2,c2(K:11805:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:11773:*) A4 -> I: nm4,c4(K:11773:*) I -> B2: m2(K:11805:*),c2(K:11805:*) B2 -> I: B2,c2(K:11805:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 210 -- (Id: 12561) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11812:*), {A3,na4}k!10, nm4, c4(K:11773:*), {A3,na4}kss1, nm3, c3(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11773:*)).out(nm4,c4(K:11773:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11643:*)).out(nm3,c3(K:11643:*))] B2: () [in(m2(K:11812:*),c2(K:11812:*)).out(B2,c2(K:11812:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A3: c3(K:11643:*) A3 -> I: nm3,c3(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:11773:*) A4 -> I: nm4,c4(K:11773:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11812:*),c2(K:11812:*) B2 -> I: B2,c2(K:11812:*) I -> B2: {A3,na4}k!10 |
ATTACK 211 -- (Id: 12573) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, c2(K:11819:*), nm3, c3(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11817:*)).out(nm3,c3(K:11817:*))] B2: () [in(m2(K:11819:*),c2(K:11819:*)).out(B2,c2(K:11819:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> A3: c3(K:11817:*) A3 -> I: nm3,c3(K:11817:*) I -> B2: m2(K:11819:*),c2(K:11819:*) B2 -> I: B2,c2(K:11819:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 212 -- (Id: 12579) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, c2(K:11819:*), nm3, c3(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11817:*)).out(nm3,c3(K:11817:*))] B2: () [in(m2(K:11819:*),c2(K:11819:*)).out(B2,c2(K:11819:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> A3: c3(K:11817:*) A3 -> I: nm3,c3(K:11817:*) I -> B2: m2(K:11819:*),c2(K:11819:*) B2 -> I: B2,c2(K:11819:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 213 -- (Id: 12587) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11835:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11817:*)).out(nm3,c3(K:11817:*))] B2: () [in(m2(K:11835:*),c2(K:11835:*)).out(B2,c2(K:11835:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> A3: c3(K:11817:*) A3 -> I: nm3,c3(K:11817:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11835:*),c2(K:11835:*) B2 -> I: B2,c2(K:11835:*) I -> B2: {A4,na3}k!10 |
ATTACK 214 -- (Id: 12593) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:11833:*), {A4,na3}kss1, nm3, c3(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11817:*)).out(nm3,c3(K:11817:*))] B2: () [in(m2(K:11833:*),c2(K:11833:*)).out(B2,c2(K:11833:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> A3: c3(K:11817:*) A3 -> I: nm3,c3(K:11817:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11833:*),c2(K:11833:*) B2 -> I: B2,c2(K:11833:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 215 -- (Id: 12601) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11847:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11817:*)).out(nm3,c3(K:11817:*))] B2: () [in(m2(K:11847:*),c2(K:11847:*)).out(B2,c2(K:11847:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> A3: c3(K:11817:*) A3 -> I: nm3,c3(K:11817:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11847:*),c2(K:11847:*) B2 -> I: B2,c2(K:11847:*) I -> B2: {A3,na4}k!10 |
ATTACK 216 -- (Id: 12607) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:11845:*), {A3,na4}kss1, nm3, c3(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11817:*)).out(nm3,c3(K:11817:*))] B2: () [in(m2(K:11845:*),c2(K:11845:*)).out(B2,c2(K:11845:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> A3: c3(K:11817:*) A3 -> I: nm3,c3(K:11817:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11845:*),c2(K:11845:*) B2 -> I: B2,c2(K:11845:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 217 -- (Id: 12617) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11857:*), c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11857:*)).out(nm3,c3(K:11857:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> A3: c3(K:11857:*) A3 -> I: nm3,c3(K:11857:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 218 -- (Id: 12623) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11857:*), c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11857:*)).out(nm3,c3(K:11857:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> A3: c3(K:11857:*) A3 -> I: nm3,c3(K:11857:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 219 -- (Id: 12631) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11873:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11873:*)).out(nm3,c3(K:11873:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:11873:*) A3 -> I: nm3,c3(K:11873:*) I -> B2: {A4,na3}k!10 |
ATTACK 220 -- (Id: 12635) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11877:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11877:*)).out(nm3,c3(K:11877:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:11877:*) A3 -> I: nm3,c3(K:11877:*) |
ATTACK 221 -- (Id: 12641) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:11871:*), {A4,na3}kss1, c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11871:*)).out(nm3,c3(K:11871:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:11871:*) A3 -> I: nm3,c3(K:11871:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 222 -- (Id: 12649) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11888:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11888:*)).out(nm3,c3(K:11888:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:11888:*) A3 -> I: nm3,c3(K:11888:*) I -> B2: {A3,na4}k!10 |
ATTACK 223 -- (Id: 12653) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11892:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11892:*)).out(nm3,c3(K:11892:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:11892:*) A3 -> I: nm3,c3(K:11892:*) |
ATTACK 224 -- (Id: 12659) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:11886:*), {A3,na4}kss1, c2(K:11817:*), nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11886:*)).out(nm3,c3(K:11886:*))] B2: () [in(m2(K:11817:*),c2(K:11817:*)).out(B2,c2(K:11817:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> B2: m2(K:11817:*),c2(K:11817:*) B2 -> I: B2,c2(K:11817:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:11886:*) A3 -> I: nm3,c3(K:11886:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 225 -- (Id: 12669) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11906:*), c2(K:11903:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11906:*)).out(nm3,c3(K:11906:*))] B2: () [in(m2(K:11903:*),c2(K:11903:*)).out(B2,c2(K:11903:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11903:*),c2(K:11903:*) B2 -> I: B2,c2(K:11903:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:11906:*) A3 -> I: nm3,c3(K:11906:*) |
ATTACK 226 -- (Id: 12673) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11905:*), c2(K:11903:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11905:*)).out(nm3,c3(K:11905:*))] B2: () [in(m2(K:11903:*),c2(K:11903:*)).out(B2,c2(K:11903:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11903:*),c2(K:11903:*) B2 -> I: B2,c2(K:11903:*) I -> A3: c3(K:11905:*) A3 -> I: nm3,c3(K:11905:*) I -> B2: {A4,na3}k!10 |
ATTACK 227 -- (Id: 12679) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11913:*), nm3, c3(K:11903:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11903:*)).out(nm3,c3(K:11903:*))] B2: () [in(m2(K:11913:*),c2(K:11913:*)).out(B2,c2(K:11913:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:11903:*) A3 -> I: nm3,c3(K:11903:*) I -> B2: m2(K:11913:*),c2(K:11913:*) B2 -> I: B2,c2(K:11913:*) I -> B2: {A4,na3}k!10 |
ATTACK 228 -- (Id: 12687) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11921:*), {A4,na3}k!10, c2(K:11901:*), {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11921:*)).out(nm3,c3(K:11921:*))] B2: () [in(m2(K:11901:*),c2(K:11901:*)).out(B2,c2(K:11901:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11901:*),c2(K:11901:*) B2 -> I: B2,c2(K:11901:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:11921:*) A3 -> I: nm3,c3(K:11921:*) |
ATTACK 229 -- (Id: 12691) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11920:*), {A4,na3}k!10, c2(K:11901:*), {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11920:*)).out(nm3,c3(K:11920:*))] B2: () [in(m2(K:11901:*),c2(K:11901:*)).out(B2,c2(K:11901:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11901:*),c2(K:11901:*) B2 -> I: B2,c2(K:11901:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:11920:*) A3 -> I: nm3,c3(K:11920:*) I -> B2: {A4,na3}k!10 |
ATTACK 230 -- (Id: 12697) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:11918:*), c2(K:11901:*), {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11918:*)).out(nm3,c3(K:11918:*))] B2: () [in(m2(K:11901:*),c2(K:11901:*)).out(B2,c2(K:11901:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:11901:*),c2(K:11901:*) B2 -> I: B2,c2(K:11901:*) I -> A3: c3(K:11918:*) A3 -> I: nm3,c3(K:11918:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 231 -- (Id: 12705) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:11933:*), nm3, c3(K:11901:*), {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11901:*)).out(nm3,c3(K:11901:*))] B2: () [in(m2(K:11933:*),c2(K:11933:*)).out(B2,c2(K:11933:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:11901:*) A3 -> I: nm3,c3(K:11901:*) I -> B2: m2(K:11933:*),c2(K:11933:*) B2 -> I: B2,c2(K:11933:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 232 -- (Id: 12711) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11940:*), {A4,na3}k!10, nm3, c3(K:11901:*), {A4,na3}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11901:*)).out(nm3,c3(K:11901:*))] B2: () [in(m2(K:11940:*),c2(K:11940:*)).out(B2,c2(K:11940:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:11901:*) A3 -> I: nm3,c3(K:11901:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:11940:*),c2(K:11940:*) B2 -> I: B2,c2(K:11940:*) I -> B2: {A4,na3}k!10 |
ATTACK 233 -- (Id: 12721) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11950:*), c2(K:11947:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11950:*)).out(nm3,c3(K:11950:*))] B2: () [in(m2(K:11947:*),c2(K:11947:*)).out(B2,c2(K:11947:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11947:*),c2(K:11947:*) B2 -> I: B2,c2(K:11947:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:11950:*) A3 -> I: nm3,c3(K:11950:*) |
ATTACK 234 -- (Id: 12725) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11949:*), c2(K:11947:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11949:*)).out(nm3,c3(K:11949:*))] B2: () [in(m2(K:11947:*),c2(K:11947:*)).out(B2,c2(K:11947:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11947:*),c2(K:11947:*) B2 -> I: B2,c2(K:11947:*) I -> A3: c3(K:11949:*) A3 -> I: nm3,c3(K:11949:*) I -> B2: {A3,na4}k!10 |
ATTACK 235 -- (Id: 12731) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11957:*), nm3, c3(K:11947:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11947:*)).out(nm3,c3(K:11947:*))] B2: () [in(m2(K:11957:*),c2(K:11957:*)).out(B2,c2(K:11957:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:11947:*) A3 -> I: nm3,c3(K:11947:*) I -> B2: m2(K:11957:*),c2(K:11957:*) B2 -> I: B2,c2(K:11957:*) I -> B2: {A3,na4}k!10 |
ATTACK 236 -- (Id: 12739) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11965:*), {A3,na4}k!10, c2(K:11945:*), {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11965:*)).out(nm3,c3(K:11965:*))] B2: () [in(m2(K:11945:*),c2(K:11945:*)).out(B2,c2(K:11945:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11945:*),c2(K:11945:*) B2 -> I: B2,c2(K:11945:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:11965:*) A3 -> I: nm3,c3(K:11965:*) |
ATTACK 237 -- (Id: 12743) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:11964:*), {A3,na4}k!10, c2(K:11945:*), {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11964:*)).out(nm3,c3(K:11964:*))] B2: () [in(m2(K:11945:*),c2(K:11945:*)).out(B2,c2(K:11945:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11945:*),c2(K:11945:*) B2 -> I: B2,c2(K:11945:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:11964:*) A3 -> I: nm3,c3(K:11964:*) I -> B2: {A3,na4}k!10 |
ATTACK 238 -- (Id: 12749) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:11962:*), c2(K:11945:*), {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11962:*)).out(nm3,c3(K:11962:*))] B2: () [in(m2(K:11945:*),c2(K:11945:*)).out(B2,c2(K:11945:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:11945:*),c2(K:11945:*) B2 -> I: B2,c2(K:11945:*) I -> A3: c3(K:11962:*) A3 -> I: nm3,c3(K:11962:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 239 -- (Id: 12757) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:11977:*), nm3, c3(K:11945:*), {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11945:*)).out(nm3,c3(K:11945:*))] B2: () [in(m2(K:11977:*),c2(K:11977:*)).out(B2,c2(K:11977:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:11945:*) A3 -> I: nm3,c3(K:11945:*) I -> B2: m2(K:11977:*),c2(K:11977:*) B2 -> I: B2,c2(K:11977:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 240 -- (Id: 12763) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:11984:*), {A3,na4}k!10, nm3, c3(K:11945:*), {A3,na4}kss1, nm4, c4(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11643:*)).out(nm4,c4(K:11643:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11945:*)).out(nm3,c3(K:11945:*))] B2: () [in(m2(K:11984:*),c2(K:11984:*)).out(B2,c2(K:11984:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> A4: c4(K:11643:*) A4 -> I: nm4,c4(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:11945:*) A3 -> I: nm3,c3(K:11945:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:11984:*),c2(K:11984:*) B2 -> I: B2,c2(K:11984:*) I -> B2: {A3,na4}k!10 |
ATTACK 241 -- (Id: 12775) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11991:*), nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11991:*)).out(nm3,c3(K:11991:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> A3: c3(K:11991:*) A3 -> I: nm3,c3(K:11991:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 242 -- (Id: 12781) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11991:*), nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11991:*)).out(nm3,c3(K:11991:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> A3: c3(K:11991:*) A3 -> I: nm3,c3(K:11991:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 243 -- (Id: 12789) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12007:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12007:*)).out(nm3,c3(K:12007:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12007:*) A3 -> I: nm3,c3(K:12007:*) I -> B2: {A4,na3}k!10 |
ATTACK 244 -- (Id: 12793) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12011:*), {A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12011:*)).out(nm3,c3(K:12011:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:12011:*) A3 -> I: nm3,c3(K:12011:*) |
ATTACK 245 -- (Id: 12799) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:12005:*), {A4,na3}kss1, nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12005:*)).out(nm3,c3(K:12005:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12005:*) A3 -> I: nm3,c3(K:12005:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 246 -- (Id: 12807) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12022:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12022:*)).out(nm3,c3(K:12022:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12022:*) A3 -> I: nm3,c3(K:12022:*) I -> B2: {A3,na4}k!10 |
ATTACK 247 -- (Id: 12811) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12026:*), {A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12026:*)).out(nm3,c3(K:12026:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:12026:*) A3 -> I: nm3,c3(K:12026:*) |
ATTACK 248 -- (Id: 12817) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:12020:*), {A3,na4}kss1, nm4, c4(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:11989:*)).out(nm4,c4(K:11989:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12020:*)).out(nm3,c3(K:12020:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A4: c4(K:11989:*) A4 -> I: nm4,c4(K:11989:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12020:*) A3 -> I: nm3,c3(K:12020:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 249 -- (Id: 12827) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, {A4,na3}kss1, nm4, c4(K:12035:*), nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12035:*)).out(nm4,c4(K:12035:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> A4: c4(K:12035:*) A4 -> I: nm4,c4(K:12035:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 250 -- (Id: 12833) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, {A3,na4}kss1, nm4, c4(K:12035:*), nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12035:*)).out(nm4,c4(K:12035:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> A4: c4(K:12035:*) A4 -> I: nm4,c4(K:12035:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 251 -- (Id: 12841) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12052:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12052:*)).out(nm4,c4(K:12052:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:12052:*) A4 -> I: nm4,c4(K:12052:*) |
ATTACK 252 -- (Id: 12845) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12051:*), {A4,na3}k!10, {A4,na3}kss1, nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12051:*)).out(nm4,c4(K:12051:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12051:*) A4 -> I: nm4,c4(K:12051:*) I -> B2: {A4,na3}k!10 |
ATTACK 253 -- (Id: 12851) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:12049:*), {A4,na3}kss1, nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12049:*)).out(nm4,c4(K:12049:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12049:*) A4 -> I: nm4,c4(K:12049:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 254 -- (Id: 12859) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12067:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12067:*)).out(nm4,c4(K:12067:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:12067:*) A4 -> I: nm4,c4(K:12067:*) |
ATTACK 255 -- (Id: 12863) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12066:*), {A3,na4}k!10, {A3,na4}kss1, nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12066:*)).out(nm4,c4(K:12066:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12066:*) A4 -> I: nm4,c4(K:12066:*) I -> B2: {A3,na4}k!10 |
ATTACK 256 -- (Id: 12869) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:12064:*), {A3,na4}kss1, nm3, c3(K:11989:*), c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12064:*)).out(nm4,c4(K:12064:*))] A3: () [out(A3,{na3}k!10).in(c3(K:11989:*)).out(nm3,c3(K:11989:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> A3: c3(K:11989:*) A3 -> I: nm3,c3(K:11989:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12064:*) A4 -> I: nm4,c4(K:12064:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 257 -- (Id: 12879) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12083:*), nm3, c3(K:12081:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12083:*)).out(nm4,c4(K:12083:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12081:*)).out(nm3,c3(K:12081:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12081:*) A3 -> I: nm3,c3(K:12081:*) I -> A4: c4(K:12083:*) A4 -> I: nm4,c4(K:12083:*) I -> B2: {A4,na3}k!10 |
ATTACK 258 -- (Id: 12883) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12087:*), nm3, c3(K:12081:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12087:*)).out(nm4,c4(K:12087:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12081:*)).out(nm3,c3(K:12081:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12081:*) A3 -> I: nm3,c3(K:12081:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:12087:*) A4 -> I: nm4,c4(K:12087:*) |
ATTACK 259 -- (Id: 12889) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12091:*), nm4, c4(K:12081:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12081:*)).out(nm4,c4(K:12081:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12091:*)).out(nm3,c3(K:12091:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12081:*) A4 -> I: nm4,c4(K:12081:*) I -> A3: c3(K:12091:*) A3 -> I: nm3,c3(K:12091:*) I -> B2: {A4,na3}k!10 |
ATTACK 260 -- (Id: 12893) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12095:*), nm4, c4(K:12081:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12081:*)).out(nm4,c4(K:12081:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12095:*)).out(nm3,c3(K:12095:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12081:*) A4 -> I: nm4,c4(K:12081:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:12095:*) A3 -> I: nm3,c3(K:12095:*) |
ATTACK 261 -- (Id: 12899) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12100:*), nm4, c4(K:12098:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12098:*)).out(nm4,c4(K:12098:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12100:*)).out(nm3,c3(K:12100:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:12098:*) A4 -> I: nm4,c4(K:12098:*) I -> A3: c3(K:12100:*) A3 -> I: nm3,c3(K:12100:*) |
ATTACK 262 -- (Id: 12904) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12104:*), nm3, c3(K:12098:*), {A4,na3}k!10, {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12104:*)).out(nm4,c4(K:12104:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12098:*)).out(nm3,c3(K:12098:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:12098:*) A3 -> I: nm3,c3(K:12098:*) I -> A4: c4(K:12104:*) A4 -> I: nm4,c4(K:12104:*) |
ATTACK 263 -- (Id: 12912) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12110:*), {A4,na3}k!10, nm3, c3(K:12079:*), {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12110:*)).out(nm4,c4(K:12110:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12079:*)).out(nm3,c3(K:12079:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12079:*) A3 -> I: nm3,c3(K:12079:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12110:*) A4 -> I: nm4,c4(K:12110:*) I -> B2: {A4,na3}k!10 |
ATTACK 264 -- (Id: 12916) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12114:*), {A4,na3}k!10, nm3, c3(K:12079:*), {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12114:*)).out(nm4,c4(K:12114:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12079:*)).out(nm3,c3(K:12079:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12079:*) A3 -> I: nm3,c3(K:12079:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:12114:*) A4 -> I: nm4,c4(K:12114:*) |
ATTACK 265 -- (Id: 12922) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:12108:*), nm3, c3(K:12079:*), {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12108:*)).out(nm4,c4(K:12108:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12079:*)).out(nm3,c3(K:12079:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12079:*) A3 -> I: nm3,c3(K:12079:*) I -> A4: c4(K:12108:*) A4 -> I: nm4,c4(K:12108:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 266 -- (Id: 12930) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:12123:*), nm4, c4(K:12079:*), {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12079:*)).out(nm4,c4(K:12079:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12123:*)).out(nm3,c3(K:12123:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12079:*) A4 -> I: nm4,c4(K:12079:*) I -> A3: c3(K:12123:*) A3 -> I: nm3,c3(K:12123:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 267 -- (Id: 12936) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12130:*), {A4,na3}k!10, nm4, c4(K:12079:*), {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12079:*)).out(nm4,c4(K:12079:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12130:*)).out(nm3,c3(K:12130:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12079:*) A4 -> I: nm4,c4(K:12079:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12130:*) A3 -> I: nm3,c3(K:12130:*) I -> B2: {A4,na3}k!10 |
ATTACK 268 -- (Id: 12940) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12134:*), {A4,na3}k!10, nm4, c4(K:12079:*), {A4,na3}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12079:*)).out(nm4,c4(K:12079:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12134:*)).out(nm3,c3(K:12134:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12079:*) A4 -> I: nm4,c4(K:12079:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:12134:*) A3 -> I: nm3,c3(K:12134:*) |
ATTACK 269 -- (Id: 12950) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12142:*), nm3, c3(K:12140:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12142:*)).out(nm4,c4(K:12142:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12140:*)).out(nm3,c3(K:12140:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12140:*) A3 -> I: nm3,c3(K:12140:*) I -> A4: c4(K:12142:*) A4 -> I: nm4,c4(K:12142:*) I -> B2: {A3,na4}k!10 |
ATTACK 270 -- (Id: 12954) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12146:*), nm3, c3(K:12140:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12146:*)).out(nm4,c4(K:12146:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12140:*)).out(nm3,c3(K:12140:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12140:*) A3 -> I: nm3,c3(K:12140:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:12146:*) A4 -> I: nm4,c4(K:12146:*) |
ATTACK 271 -- (Id: 12960) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12150:*), nm4, c4(K:12140:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12140:*)).out(nm4,c4(K:12140:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12150:*)).out(nm3,c3(K:12150:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12140:*) A4 -> I: nm4,c4(K:12140:*) I -> A3: c3(K:12150:*) A3 -> I: nm3,c3(K:12150:*) I -> B2: {A3,na4}k!10 |
ATTACK 272 -- (Id: 12964) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12154:*), nm4, c4(K:12140:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12140:*)).out(nm4,c4(K:12140:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12154:*)).out(nm3,c3(K:12154:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12140:*) A4 -> I: nm4,c4(K:12140:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:12154:*) A3 -> I: nm3,c3(K:12154:*) |
ATTACK 273 -- (Id: 12970) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12159:*), nm4, c4(K:12157:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12157:*)).out(nm4,c4(K:12157:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12159:*)).out(nm3,c3(K:12159:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:12157:*) A4 -> I: nm4,c4(K:12157:*) I -> A3: c3(K:12159:*) A3 -> I: nm3,c3(K:12159:*) |
ATTACK 274 -- (Id: 12975) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12163:*), nm3, c3(K:12157:*), {A3,na4}k!10, {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12163:*)).out(nm4,c4(K:12163:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12157:*)).out(nm3,c3(K:12157:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:12157:*) A3 -> I: nm3,c3(K:12157:*) I -> A4: c4(K:12163:*) A4 -> I: nm4,c4(K:12163:*) |
ATTACK 275 -- (Id: 12983) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12169:*), {A3,na4}k!10, nm3, c3(K:12138:*), {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12169:*)).out(nm4,c4(K:12169:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12138:*)).out(nm3,c3(K:12138:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12138:*) A3 -> I: nm3,c3(K:12138:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12169:*) A4 -> I: nm4,c4(K:12169:*) I -> B2: {A3,na4}k!10 |
ATTACK 276 -- (Id: 12987) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12173:*), {A3,na4}k!10, nm3, c3(K:12138:*), {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12173:*)).out(nm4,c4(K:12173:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12138:*)).out(nm3,c3(K:12138:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12138:*) A3 -> I: nm3,c3(K:12138:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:12173:*) A4 -> I: nm4,c4(K:12173:*) |
ATTACK 277 -- (Id: 12993) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:12167:*), nm3, c3(K:12138:*), {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12167:*)).out(nm4,c4(K:12167:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12138:*)).out(nm3,c3(K:12138:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12138:*) A3 -> I: nm3,c3(K:12138:*) I -> A4: c4(K:12167:*) A4 -> I: nm4,c4(K:12167:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 278 -- (Id: 13001) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:12182:*), nm4, c4(K:12138:*), {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12138:*)).out(nm4,c4(K:12138:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12182:*)).out(nm3,c3(K:12182:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12138:*) A4 -> I: nm4,c4(K:12138:*) I -> A3: c3(K:12182:*) A3 -> I: nm3,c3(K:12182:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 279 -- (Id: 13007) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12189:*), {A3,na4}k!10, nm4, c4(K:12138:*), {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12138:*)).out(nm4,c4(K:12138:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12189:*)).out(nm3,c3(K:12189:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12138:*) A4 -> I: nm4,c4(K:12138:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12189:*) A3 -> I: nm3,c3(K:12189:*) I -> B2: {A3,na4}k!10 |
ATTACK 280 -- (Id: 13011) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12193:*), {A3,na4}k!10, nm4, c4(K:12138:*), {A3,na4}kss1, c2(K:11643:*), {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12138:*)).out(nm4,c4(K:12138:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12193:*)).out(nm3,c3(K:12193:*))] B2: () [in(m2(K:11643:*),c2(K:11643:*)).out(B2,c2(K:11643:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> B2: m2(K:11643:*),c2(K:11643:*) B2 -> I: B2,c2(K:11643:*) I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12138:*) A4 -> I: nm4,c4(K:12138:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:12193:*) A3 -> I: nm3,c3(K:12193:*) |
ATTACK 281 -- (Id: 13023) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12204:*), nm4, c4(K:12202:*), c2(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12202:*)).out(nm4,c4(K:12202:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12204:*)).out(nm3,c3(K:12204:*))] B2: () [in(m2(K:12199:*),c2(K:12199:*)).out(B2,c2(K:12199:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12199:*),c2(K:12199:*) B2 -> I: B2,c2(K:12199:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:12202:*) A4 -> I: nm4,c4(K:12202:*) I -> A3: c3(K:12204:*) A3 -> I: nm3,c3(K:12204:*) |
ATTACK 282 -- (Id: 13028) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12208:*), nm3, c3(K:12202:*), c2(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12208:*)).out(nm4,c4(K:12208:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12202:*)).out(nm3,c3(K:12202:*))] B2: () [in(m2(K:12199:*),c2(K:12199:*)).out(B2,c2(K:12199:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12199:*),c2(K:12199:*) B2 -> I: B2,c2(K:12199:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:12202:*) A3 -> I: nm3,c3(K:12202:*) I -> A4: c4(K:12208:*) A4 -> I: nm4,c4(K:12208:*) |
ATTACK 283 -- (Id: 13034) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12213:*), nm4, c4(K:12201:*), c2(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12201:*)).out(nm4,c4(K:12201:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12213:*)).out(nm3,c3(K:12213:*))] B2: () [in(m2(K:12199:*),c2(K:12199:*)).out(B2,c2(K:12199:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12199:*),c2(K:12199:*) B2 -> I: B2,c2(K:12199:*) I -> A4: c4(K:12201:*) A4 -> I: nm4,c4(K:12201:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:12213:*) A3 -> I: nm3,c3(K:12213:*) |
ATTACK 284 -- (Id: 13038) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12212:*), nm4, c4(K:12201:*), c2(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12201:*)).out(nm4,c4(K:12201:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12212:*)).out(nm3,c3(K:12212:*))] B2: () [in(m2(K:12199:*),c2(K:12199:*)).out(B2,c2(K:12199:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12199:*),c2(K:12199:*) B2 -> I: B2,c2(K:12199:*) I -> A4: c4(K:12201:*) A4 -> I: nm4,c4(K:12201:*) I -> A3: c3(K:12212:*) A3 -> I: nm3,c3(K:12212:*) I -> B2: {A4,na3}k!10 |
ATTACK 285 -- (Id: 13044) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12220:*), nm3, c3(K:12201:*), c2(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12220:*)).out(nm4,c4(K:12220:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12201:*)).out(nm3,c3(K:12201:*))] B2: () [in(m2(K:12199:*),c2(K:12199:*)).out(B2,c2(K:12199:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12199:*),c2(K:12199:*) B2 -> I: B2,c2(K:12199:*) I -> A3: c3(K:12201:*) A3 -> I: nm3,c3(K:12201:*) I -> A4: c4(K:12220:*) A4 -> I: nm4,c4(K:12220:*) I -> B2: {A4,na3}k!10 |
ATTACK 286 -- (Id: 13048) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12224:*), nm3, c3(K:12201:*), c2(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12224:*)).out(nm4,c4(K:12224:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12201:*)).out(nm3,c3(K:12201:*))] B2: () [in(m2(K:12199:*),c2(K:12199:*)).out(B2,c2(K:12199:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12199:*),c2(K:12199:*) B2 -> I: B2,c2(K:12199:*) I -> A3: c3(K:12201:*) A3 -> I: nm3,c3(K:12201:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:12224:*) A4 -> I: nm4,c4(K:12224:*) |
ATTACK 287 -- (Id: 13056) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12231:*), c2(K:12228:*), nm4, c4(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12199:*)).out(nm4,c4(K:12199:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12231:*)).out(nm3,c3(K:12231:*))] B2: () [in(m2(K:12228:*),c2(K:12228:*)).out(B2,c2(K:12228:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12199:*) A4 -> I: nm4,c4(K:12199:*) I -> B2: m2(K:12228:*),c2(K:12228:*) B2 -> I: B2,c2(K:12228:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:12231:*) A3 -> I: nm3,c3(K:12231:*) |
ATTACK 288 -- (Id: 13060) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12230:*), c2(K:12228:*), nm4, c4(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12199:*)).out(nm4,c4(K:12199:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12230:*)).out(nm3,c3(K:12230:*))] B2: () [in(m2(K:12228:*),c2(K:12228:*)).out(B2,c2(K:12228:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12199:*) A4 -> I: nm4,c4(K:12199:*) I -> B2: m2(K:12228:*),c2(K:12228:*) B2 -> I: B2,c2(K:12228:*) I -> A3: c3(K:12230:*) A3 -> I: nm3,c3(K:12230:*) I -> B2: {A4,na3}k!10 |
ATTACK 289 -- (Id: 13066) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12238:*), nm3, c3(K:12228:*), nm4, c4(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12199:*)).out(nm4,c4(K:12199:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12228:*)).out(nm3,c3(K:12228:*))] B2: () [in(m2(K:12238:*),c2(K:12238:*)).out(B2,c2(K:12238:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12199:*) A4 -> I: nm4,c4(K:12199:*) I -> A3: c3(K:12228:*) A3 -> I: nm3,c3(K:12228:*) I -> B2: m2(K:12238:*),c2(K:12238:*) B2 -> I: B2,c2(K:12238:*) I -> B2: {A4,na3}k!10 |
ATTACK 290 -- (Id: 13074) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12245:*), nm4, c4(K:12243:*), nm3, c3(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12243:*)).out(nm4,c4(K:12243:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12199:*)).out(nm3,c3(K:12199:*))] B2: () [in(m2(K:12245:*),c2(K:12245:*)).out(B2,c2(K:12245:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12199:*) A3 -> I: nm3,c3(K:12199:*) I -> A4: c4(K:12243:*) A4 -> I: nm4,c4(K:12243:*) I -> B2: m2(K:12245:*),c2(K:12245:*) B2 -> I: B2,c2(K:12245:*) I -> B2: {A4,na3}k!10 |
ATTACK 291 -- (Id: 13080) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12251:*), c2(K:12243:*), nm3, c3(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12251:*)).out(nm4,c4(K:12251:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12199:*)).out(nm3,c3(K:12199:*))] B2: () [in(m2(K:12243:*),c2(K:12243:*)).out(B2,c2(K:12243:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12199:*) A3 -> I: nm3,c3(K:12199:*) I -> B2: m2(K:12243:*),c2(K:12243:*) B2 -> I: B2,c2(K:12243:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:12251:*) A4 -> I: nm4,c4(K:12251:*) |
ATTACK 292 -- (Id: 13084) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12250:*), c2(K:12243:*), nm3, c3(K:12199:*), {A4,na3}k!10, {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12250:*)).out(nm4,c4(K:12250:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12199:*)).out(nm3,c3(K:12199:*))] B2: () [in(m2(K:12243:*),c2(K:12243:*)).out(B2,c2(K:12243:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12199:*) A3 -> I: nm3,c3(K:12199:*) I -> B2: m2(K:12243:*),c2(K:12243:*) B2 -> I: B2,c2(K:12243:*) I -> A4: c4(K:12250:*) A4 -> I: nm4,c4(K:12250:*) I -> B2: {A4,na3}k!10 |
ATTACK 293 -- (Id: 13094) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12263:*), nm4, c4(K:12261:*), {A4,na3}k!10, c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12261:*)).out(nm4,c4(K:12261:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12263:*)).out(nm3,c3(K:12263:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:12261:*) A4 -> I: nm4,c4(K:12261:*) I -> A3: c3(K:12263:*) A3 -> I: nm3,c3(K:12263:*) |
ATTACK 294 -- (Id: 13099) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12267:*), nm3, c3(K:12261:*), {A4,na3}k!10, c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12267:*)).out(nm4,c4(K:12267:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12261:*)).out(nm3,c3(K:12261:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:12261:*) A3 -> I: nm3,c3(K:12261:*) I -> A4: c4(K:12267:*) A4 -> I: nm4,c4(K:12267:*) |
ATTACK 295 -- (Id: 13105) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12272:*), nm4, c4(K:12260:*), {A4,na3}k!10, c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12260:*)).out(nm4,c4(K:12260:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12272:*)).out(nm3,c3(K:12272:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12260:*) A4 -> I: nm4,c4(K:12260:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:12272:*) A3 -> I: nm3,c3(K:12272:*) |
ATTACK 296 -- (Id: 13109) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12271:*), nm4, c4(K:12260:*), {A4,na3}k!10, c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12260:*)).out(nm4,c4(K:12260:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12271:*)).out(nm3,c3(K:12271:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12260:*) A4 -> I: nm4,c4(K:12260:*) I -> A3: c3(K:12271:*) A3 -> I: nm3,c3(K:12271:*) I -> B2: {A4,na3}k!10 |
ATTACK 297 -- (Id: 13115) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12279:*), nm3, c3(K:12260:*), {A4,na3}k!10, c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12279:*)).out(nm4,c4(K:12279:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12260:*)).out(nm3,c3(K:12260:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12260:*) A3 -> I: nm3,c3(K:12260:*) I -> A4: c4(K:12279:*) A4 -> I: nm4,c4(K:12279:*) I -> B2: {A4,na3}k!10 |
ATTACK 298 -- (Id: 13119) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12283:*), nm3, c3(K:12260:*), {A4,na3}k!10, c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12283:*)).out(nm4,c4(K:12283:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12260:*)).out(nm3,c3(K:12260:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12260:*) A3 -> I: nm3,c3(K:12260:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:12283:*) A4 -> I: nm4,c4(K:12283:*) |
ATTACK 299 -- (Id: 13127) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12290:*), {A4,na3}k!10, nm4, c4(K:12258:*), c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12258:*)).out(nm4,c4(K:12258:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12290:*)).out(nm3,c3(K:12290:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> A4: c4(K:12258:*) A4 -> I: nm4,c4(K:12258:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:12290:*) A3 -> I: nm3,c3(K:12290:*) |
ATTACK 300 -- (Id: 13131) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12289:*), {A4,na3}k!10, nm4, c4(K:12258:*), c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12258:*)).out(nm4,c4(K:12258:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12289:*)).out(nm3,c3(K:12289:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> A4: c4(K:12258:*) A4 -> I: nm4,c4(K:12258:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12289:*) A3 -> I: nm3,c3(K:12289:*) I -> B2: {A4,na3}k!10 |
ATTACK 301 -- (Id: 13137) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:12287:*), nm4, c4(K:12258:*), c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12258:*)).out(nm4,c4(K:12258:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12287:*)).out(nm3,c3(K:12287:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> A4: c4(K:12258:*) A4 -> I: nm4,c4(K:12258:*) I -> A3: c3(K:12287:*) A3 -> I: nm3,c3(K:12287:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 302 -- (Id: 13145) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:12302:*), nm3, c3(K:12258:*), c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12302:*)).out(nm4,c4(K:12302:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12258:*)).out(nm3,c3(K:12258:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> A3: c3(K:12258:*) A3 -> I: nm3,c3(K:12258:*) I -> A4: c4(K:12302:*) A4 -> I: nm4,c4(K:12302:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 303 -- (Id: 13151) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12309:*), {A4,na3}k!10, nm3, c3(K:12258:*), c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12309:*)).out(nm4,c4(K:12309:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12258:*)).out(nm3,c3(K:12258:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> A3: c3(K:12258:*) A3 -> I: nm3,c3(K:12258:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12309:*) A4 -> I: nm4,c4(K:12309:*) I -> B2: {A4,na3}k!10 |
ATTACK 304 -- (Id: 13155) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12313:*), {A4,na3}k!10, nm3, c3(K:12258:*), c2(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12313:*)).out(nm4,c4(K:12313:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12258:*)).out(nm3,c3(K:12258:*))] B2: () [in(m2(K:12197:*),c2(K:12197:*)).out(B2,c2(K:12197:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> B2: m2(K:12197:*),c2(K:12197:*) B2 -> I: B2,c2(K:12197:*) I -> A3: c3(K:12258:*) A3 -> I: nm3,c3(K:12258:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:12313:*) A4 -> I: nm4,c4(K:12313:*) |
ATTACK 305 -- (Id: 13165) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12322:*), {A4,na3}k!10, c2(K:12317:*), nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12322:*)).out(nm3,c3(K:12322:*))] B2: () [in(m2(K:12317:*),c2(K:12317:*)).out(B2,c2(K:12317:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> B2: m2(K:12317:*),c2(K:12317:*) B2 -> I: B2,c2(K:12317:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A3: c3(K:12322:*) A3 -> I: nm3,c3(K:12322:*) |
ATTACK 306 -- (Id: 13169) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12321:*), {A4,na3}k!10, c2(K:12317:*), nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12321:*)).out(nm3,c3(K:12321:*))] B2: () [in(m2(K:12317:*),c2(K:12317:*)).out(B2,c2(K:12317:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> B2: m2(K:12317:*),c2(K:12317:*) B2 -> I: B2,c2(K:12317:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12321:*) A3 -> I: nm3,c3(K:12321:*) I -> B2: {A4,na3}k!10 |
ATTACK 307 -- (Id: 13175) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm3, c3(K:12319:*), c2(K:12317:*), nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12319:*)).out(nm3,c3(K:12319:*))] B2: () [in(m2(K:12317:*),c2(K:12317:*)).out(B2,c2(K:12317:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> B2: m2(K:12317:*),c2(K:12317:*) B2 -> I: B2,c2(K:12317:*) I -> A3: c3(K:12319:*) A3 -> I: nm3,c3(K:12319:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 308 -- (Id: 13183) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12337:*), c2(K:12334:*), {A4,na3}k!10, nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12337:*)).out(nm3,c3(K:12337:*))] B2: () [in(m2(K:12334:*),c2(K:12334:*)).out(B2,c2(K:12334:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12334:*),c2(K:12334:*) B2 -> I: B2,c2(K:12334:*) I -> B2: {A4,na3}k!10 I -> A3: c3(K:12337:*) A3 -> I: nm3,c3(K:12337:*) |
ATTACK 309 -- (Id: 13187) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12336:*), c2(K:12334:*), {A4,na3}k!10, nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12336:*)).out(nm3,c3(K:12336:*))] B2: () [in(m2(K:12334:*),c2(K:12334:*)).out(B2,c2(K:12334:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12334:*),c2(K:12334:*) B2 -> I: B2,c2(K:12334:*) I -> A3: c3(K:12336:*) A3 -> I: nm3,c3(K:12336:*) I -> B2: {A4,na3}k!10 |
ATTACK 310 -- (Id: 13193) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12344:*), nm3, c3(K:12334:*), {A4,na3}k!10, nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12334:*)).out(nm3,c3(K:12334:*))] B2: () [in(m2(K:12344:*),c2(K:12344:*)).out(B2,c2(K:12344:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A3: c3(K:12334:*) A3 -> I: nm3,c3(K:12334:*) I -> B2: m2(K:12344:*),c2(K:12344:*) B2 -> I: B2,c2(K:12344:*) I -> B2: {A4,na3}k!10 |
ATTACK 311 -- (Id: 13201) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12351:*), {A4,na3}k!10, nm3, c3(K:12317:*), nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12317:*)).out(nm3,c3(K:12317:*))] B2: () [in(m2(K:12351:*),c2(K:12351:*)).out(B2,c2(K:12351:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> A3: c3(K:12317:*) A3 -> I: nm3,c3(K:12317:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12351:*),c2(K:12351:*) B2 -> I: B2,c2(K:12351:*) I -> B2: {A4,na3}k!10 |
ATTACK 312 -- (Id: 13207) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:12349:*), nm3, c3(K:12317:*), nm4, c4(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12197:*)).out(nm4,c4(K:12197:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12317:*)).out(nm3,c3(K:12317:*))] B2: () [in(m2(K:12349:*),c2(K:12349:*)).out(B2,c2(K:12349:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A4: c4(K:12197:*) A4 -> I: nm4,c4(K:12197:*) I -> A3: c3(K:12317:*) A3 -> I: nm3,c3(K:12317:*) I -> B2: m2(K:12349:*),c2(K:12349:*) B2 -> I: B2,c2(K:12349:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 313 -- (Id: 13217) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, c2(K:12363:*), nm4, c4(K:12361:*), nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12361:*)).out(nm4,c4(K:12361:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12363:*),c2(K:12363:*)).out(B2,c2(K:12363:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> A4: c4(K:12361:*) A4 -> I: nm4,c4(K:12361:*) I -> B2: m2(K:12363:*),c2(K:12363:*) B2 -> I: B2,c2(K:12363:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 314 -- (Id: 13223) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12370:*), {A4,na3}k!10, nm4, c4(K:12361:*), nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12361:*)).out(nm4,c4(K:12361:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12370:*),c2(K:12370:*)).out(B2,c2(K:12370:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> A4: c4(K:12361:*) A4 -> I: nm4,c4(K:12361:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12370:*),c2(K:12370:*) B2 -> I: B2,c2(K:12370:*) I -> B2: {A4,na3}k!10 |
ATTACK 315 -- (Id: 13231) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A4,na3}k!10, nm4, c4(K:12375:*), c2(K:12361:*), nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12375:*)).out(nm4,c4(K:12375:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12361:*),c2(K:12361:*)).out(B2,c2(K:12361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> B2: m2(K:12361:*),c2(K:12361:*) B2 -> I: B2,c2(K:12361:*) I -> A4: c4(K:12375:*) A4 -> I: nm4,c4(K:12375:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 |
ATTACK 316 -- (Id: 13237) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12382:*), {A4,na3}k!10, c2(K:12361:*), nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12382:*)).out(nm4,c4(K:12382:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12361:*),c2(K:12361:*)).out(B2,c2(K:12361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> B2: m2(K:12361:*),c2(K:12361:*) B2 -> I: B2,c2(K:12361:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12382:*) A4 -> I: nm4,c4(K:12382:*) I -> B2: {A4,na3}k!10 |
ATTACK 317 -- (Id: 13241) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12386:*), {A4,na3}k!10, c2(K:12361:*), nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12386:*)).out(nm4,c4(K:12386:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12361:*),c2(K:12361:*)).out(B2,c2(K:12361:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> B2: m2(K:12361:*),c2(K:12361:*) B2 -> I: B2,c2(K:12361:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: {A4,na3}k!10 I -> A4: c4(K:12386:*) A4 -> I: nm4,c4(K:12386:*) |
ATTACK 318 -- (Id: 13249) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12393:*), c2(K:12390:*), {A4,na3}k!10, nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12393:*)).out(nm4,c4(K:12393:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12390:*),c2(K:12390:*)).out(B2,c2(K:12390:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12390:*),c2(K:12390:*) B2 -> I: B2,c2(K:12390:*) I -> B2: {A4,na3}k!10 I -> A4: c4(K:12393:*) A4 -> I: nm4,c4(K:12393:*) |
ATTACK 319 -- (Id: 13253) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12392:*), c2(K:12390:*), {A4,na3}k!10, nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12392:*)).out(nm4,c4(K:12392:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12390:*),c2(K:12390:*)).out(B2,c2(K:12390:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> B2: m2(K:12390:*),c2(K:12390:*) B2 -> I: B2,c2(K:12390:*) I -> A4: c4(K:12392:*) A4 -> I: nm4,c4(K:12392:*) I -> B2: {A4,na3}k!10 |
ATTACK 320 -- (Id: 13259) | |
Violated Constraints | Open Variables |
u1 = A4 v1 = B2 tu1 < > na4 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A4 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12400:*), nm4, c4(K:12390:*), {A4,na3}k!10, nm3, c3(K:12197:*), {A4,na3}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12390:*)).out(nm4,c4(K:12390:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12197:*)).out(nm3,c3(K:12197:*))] B2: () [in(m2(K:12400:*),c2(K:12400:*)).out(B2,c2(K:12400:*)).in({A4,na3}k!10)] S1: () [in(A4,{na3}k!10).out({A4,na3}kss1).in(B2,{A4,na3}kss1).out({A4,na3}k!10)] |
Model | Intruder process |
u1(K:5:n -> A4 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A4,{na3}k!10 S1 -> I: {A4,na3}kss1 I -> A3: c3(K:12197:*) A3 -> I: nm3,c3(K:12197:*) I -> S1: B2,{A4,na3}kss1 S1 -> I: {A4,na3}k!10 I -> A4: c4(K:12390:*) A4 -> I: nm4,c4(K:12390:*) I -> B2: m2(K:12400:*),c2(K:12400:*) B2 -> I: B2,c2(K:12400:*) I -> B2: {A4,na3}k!10 |
ATTACK 321 -- (Id: 13271) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12412:*), nm4, c4(K:12410:*), c2(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12410:*)).out(nm4,c4(K:12410:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12412:*)).out(nm3,c3(K:12412:*))] B2: () [in(m2(K:12407:*),c2(K:12407:*)).out(B2,c2(K:12407:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12407:*),c2(K:12407:*) B2 -> I: B2,c2(K:12407:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:12410:*) A4 -> I: nm4,c4(K:12410:*) I -> A3: c3(K:12412:*) A3 -> I: nm3,c3(K:12412:*) |
ATTACK 322 -- (Id: 13276) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12416:*), nm3, c3(K:12410:*), c2(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12416:*)).out(nm4,c4(K:12416:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12410:*)).out(nm3,c3(K:12410:*))] B2: () [in(m2(K:12407:*),c2(K:12407:*)).out(B2,c2(K:12407:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12407:*),c2(K:12407:*) B2 -> I: B2,c2(K:12407:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:12410:*) A3 -> I: nm3,c3(K:12410:*) I -> A4: c4(K:12416:*) A4 -> I: nm4,c4(K:12416:*) |
ATTACK 323 -- (Id: 13282) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12421:*), nm4, c4(K:12409:*), c2(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12409:*)).out(nm4,c4(K:12409:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12421:*)).out(nm3,c3(K:12421:*))] B2: () [in(m2(K:12407:*),c2(K:12407:*)).out(B2,c2(K:12407:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12407:*),c2(K:12407:*) B2 -> I: B2,c2(K:12407:*) I -> A4: c4(K:12409:*) A4 -> I: nm4,c4(K:12409:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:12421:*) A3 -> I: nm3,c3(K:12421:*) |
ATTACK 324 -- (Id: 13286) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12420:*), nm4, c4(K:12409:*), c2(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12409:*)).out(nm4,c4(K:12409:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12420:*)).out(nm3,c3(K:12420:*))] B2: () [in(m2(K:12407:*),c2(K:12407:*)).out(B2,c2(K:12407:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12407:*),c2(K:12407:*) B2 -> I: B2,c2(K:12407:*) I -> A4: c4(K:12409:*) A4 -> I: nm4,c4(K:12409:*) I -> A3: c3(K:12420:*) A3 -> I: nm3,c3(K:12420:*) I -> B2: {A3,na4}k!10 |
ATTACK 325 -- (Id: 13292) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12428:*), nm3, c3(K:12409:*), c2(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12428:*)).out(nm4,c4(K:12428:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12409:*)).out(nm3,c3(K:12409:*))] B2: () [in(m2(K:12407:*),c2(K:12407:*)).out(B2,c2(K:12407:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12407:*),c2(K:12407:*) B2 -> I: B2,c2(K:12407:*) I -> A3: c3(K:12409:*) A3 -> I: nm3,c3(K:12409:*) I -> A4: c4(K:12428:*) A4 -> I: nm4,c4(K:12428:*) I -> B2: {A3,na4}k!10 |
ATTACK 326 -- (Id: 13296) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12432:*), nm3, c3(K:12409:*), c2(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12432:*)).out(nm4,c4(K:12432:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12409:*)).out(nm3,c3(K:12409:*))] B2: () [in(m2(K:12407:*),c2(K:12407:*)).out(B2,c2(K:12407:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12407:*),c2(K:12407:*) B2 -> I: B2,c2(K:12407:*) I -> A3: c3(K:12409:*) A3 -> I: nm3,c3(K:12409:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:12432:*) A4 -> I: nm4,c4(K:12432:*) |
ATTACK 327 -- (Id: 13304) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12439:*), c2(K:12436:*), nm4, c4(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12407:*)).out(nm4,c4(K:12407:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12439:*)).out(nm3,c3(K:12439:*))] B2: () [in(m2(K:12436:*),c2(K:12436:*)).out(B2,c2(K:12436:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12407:*) A4 -> I: nm4,c4(K:12407:*) I -> B2: m2(K:12436:*),c2(K:12436:*) B2 -> I: B2,c2(K:12436:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:12439:*) A3 -> I: nm3,c3(K:12439:*) |
ATTACK 328 -- (Id: 13308) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12438:*), c2(K:12436:*), nm4, c4(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12407:*)).out(nm4,c4(K:12407:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12438:*)).out(nm3,c3(K:12438:*))] B2: () [in(m2(K:12436:*),c2(K:12436:*)).out(B2,c2(K:12436:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12407:*) A4 -> I: nm4,c4(K:12407:*) I -> B2: m2(K:12436:*),c2(K:12436:*) B2 -> I: B2,c2(K:12436:*) I -> A3: c3(K:12438:*) A3 -> I: nm3,c3(K:12438:*) I -> B2: {A3,na4}k!10 |
ATTACK 329 -- (Id: 13314) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12446:*), nm3, c3(K:12436:*), nm4, c4(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12407:*)).out(nm4,c4(K:12407:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12436:*)).out(nm3,c3(K:12436:*))] B2: () [in(m2(K:12446:*),c2(K:12446:*)).out(B2,c2(K:12446:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12407:*) A4 -> I: nm4,c4(K:12407:*) I -> A3: c3(K:12436:*) A3 -> I: nm3,c3(K:12436:*) I -> B2: m2(K:12446:*),c2(K:12446:*) B2 -> I: B2,c2(K:12446:*) I -> B2: {A3,na4}k!10 |
ATTACK 330 -- (Id: 13322) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12453:*), nm4, c4(K:12451:*), nm3, c3(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12451:*)).out(nm4,c4(K:12451:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12407:*)).out(nm3,c3(K:12407:*))] B2: () [in(m2(K:12453:*),c2(K:12453:*)).out(B2,c2(K:12453:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12407:*) A3 -> I: nm3,c3(K:12407:*) I -> A4: c4(K:12451:*) A4 -> I: nm4,c4(K:12451:*) I -> B2: m2(K:12453:*),c2(K:12453:*) B2 -> I: B2,c2(K:12453:*) I -> B2: {A3,na4}k!10 |
ATTACK 331 -- (Id: 13328) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12459:*), c2(K:12451:*), nm3, c3(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12459:*)).out(nm4,c4(K:12459:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12407:*)).out(nm3,c3(K:12407:*))] B2: () [in(m2(K:12451:*),c2(K:12451:*)).out(B2,c2(K:12451:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12407:*) A3 -> I: nm3,c3(K:12407:*) I -> B2: m2(K:12451:*),c2(K:12451:*) B2 -> I: B2,c2(K:12451:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:12459:*) A4 -> I: nm4,c4(K:12459:*) |
ATTACK 332 -- (Id: 13332) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12458:*), c2(K:12451:*), nm3, c3(K:12407:*), {A3,na4}k!10, {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12458:*)).out(nm4,c4(K:12458:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12407:*)).out(nm3,c3(K:12407:*))] B2: () [in(m2(K:12451:*),c2(K:12451:*)).out(B2,c2(K:12451:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12407:*) A3 -> I: nm3,c3(K:12407:*) I -> B2: m2(K:12451:*),c2(K:12451:*) B2 -> I: B2,c2(K:12451:*) I -> A4: c4(K:12458:*) A4 -> I: nm4,c4(K:12458:*) I -> B2: {A3,na4}k!10 |
ATTACK 333 -- (Id: 13342) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12471:*), nm4, c4(K:12469:*), {A3,na4}k!10, c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12469:*)).out(nm4,c4(K:12469:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12471:*)).out(nm3,c3(K:12471:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:12469:*) A4 -> I: nm4,c4(K:12469:*) I -> A3: c3(K:12471:*) A3 -> I: nm3,c3(K:12471:*) |
ATTACK 334 -- (Id: 13347) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12475:*), nm3, c3(K:12469:*), {A3,na4}k!10, c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12475:*)).out(nm4,c4(K:12475:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12469:*)).out(nm3,c3(K:12469:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:12469:*) A3 -> I: nm3,c3(K:12469:*) I -> A4: c4(K:12475:*) A4 -> I: nm4,c4(K:12475:*) |
ATTACK 335 -- (Id: 13353) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12480:*), nm4, c4(K:12468:*), {A3,na4}k!10, c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12468:*)).out(nm4,c4(K:12468:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12480:*)).out(nm3,c3(K:12480:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12468:*) A4 -> I: nm4,c4(K:12468:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:12480:*) A3 -> I: nm3,c3(K:12480:*) |
ATTACK 336 -- (Id: 13357) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12479:*), nm4, c4(K:12468:*), {A3,na4}k!10, c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12468:*)).out(nm4,c4(K:12468:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12479:*)).out(nm3,c3(K:12479:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12468:*) A4 -> I: nm4,c4(K:12468:*) I -> A3: c3(K:12479:*) A3 -> I: nm3,c3(K:12479:*) I -> B2: {A3,na4}k!10 |
ATTACK 337 -- (Id: 13363) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12487:*), nm3, c3(K:12468:*), {A3,na4}k!10, c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12487:*)).out(nm4,c4(K:12487:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12468:*)).out(nm3,c3(K:12468:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12468:*) A3 -> I: nm3,c3(K:12468:*) I -> A4: c4(K:12487:*) A4 -> I: nm4,c4(K:12487:*) I -> B2: {A3,na4}k!10 |
ATTACK 338 -- (Id: 13367) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12491:*), nm3, c3(K:12468:*), {A3,na4}k!10, c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12491:*)).out(nm4,c4(K:12491:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12468:*)).out(nm3,c3(K:12468:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12468:*) A3 -> I: nm3,c3(K:12468:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:12491:*) A4 -> I: nm4,c4(K:12491:*) |
ATTACK 339 -- (Id: 13375) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12498:*), {A3,na4}k!10, nm4, c4(K:12466:*), c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12466:*)).out(nm4,c4(K:12466:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12498:*)).out(nm3,c3(K:12498:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> A4: c4(K:12466:*) A4 -> I: nm4,c4(K:12466:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:12498:*) A3 -> I: nm3,c3(K:12498:*) |
ATTACK 340 -- (Id: 13379) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12497:*), {A3,na4}k!10, nm4, c4(K:12466:*), c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12466:*)).out(nm4,c4(K:12466:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12497:*)).out(nm3,c3(K:12497:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> A4: c4(K:12466:*) A4 -> I: nm4,c4(K:12466:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12497:*) A3 -> I: nm3,c3(K:12497:*) I -> B2: {A3,na4}k!10 |
ATTACK 341 -- (Id: 13385) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:12495:*), nm4, c4(K:12466:*), c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12466:*)).out(nm4,c4(K:12466:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12495:*)).out(nm3,c3(K:12495:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> A4: c4(K:12466:*) A4 -> I: nm4,c4(K:12466:*) I -> A3: c3(K:12495:*) A3 -> I: nm3,c3(K:12495:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 342 -- (Id: 13393) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:12510:*), nm3, c3(K:12466:*), c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12510:*)).out(nm4,c4(K:12510:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12466:*)).out(nm3,c3(K:12466:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> A3: c3(K:12466:*) A3 -> I: nm3,c3(K:12466:*) I -> A4: c4(K:12510:*) A4 -> I: nm4,c4(K:12510:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 343 -- (Id: 13399) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12517:*), {A3,na4}k!10, nm3, c3(K:12466:*), c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12517:*)).out(nm4,c4(K:12517:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12466:*)).out(nm3,c3(K:12466:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> A3: c3(K:12466:*) A3 -> I: nm3,c3(K:12466:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12517:*) A4 -> I: nm4,c4(K:12517:*) I -> B2: {A3,na4}k!10 |
ATTACK 344 -- (Id: 13403) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12521:*), {A3,na4}k!10, nm3, c3(K:12466:*), c2(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12521:*)).out(nm4,c4(K:12521:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12466:*)).out(nm3,c3(K:12466:*))] B2: () [in(m2(K:12405:*),c2(K:12405:*)).out(B2,c2(K:12405:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> B2: m2(K:12405:*),c2(K:12405:*) B2 -> I: B2,c2(K:12405:*) I -> A3: c3(K:12466:*) A3 -> I: nm3,c3(K:12466:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:12521:*) A4 -> I: nm4,c4(K:12521:*) |
ATTACK 345 -- (Id: 13413) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12530:*), {A3,na4}k!10, c2(K:12525:*), nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12530:*)).out(nm3,c3(K:12530:*))] B2: () [in(m2(K:12525:*),c2(K:12525:*)).out(B2,c2(K:12525:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> B2: m2(K:12525:*),c2(K:12525:*) B2 -> I: B2,c2(K:12525:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A3: c3(K:12530:*) A3 -> I: nm3,c3(K:12530:*) |
ATTACK 346 -- (Id: 13417) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12529:*), {A3,na4}k!10, c2(K:12525:*), nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12529:*)).out(nm3,c3(K:12529:*))] B2: () [in(m2(K:12525:*),c2(K:12525:*)).out(B2,c2(K:12525:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> B2: m2(K:12525:*),c2(K:12525:*) B2 -> I: B2,c2(K:12525:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12529:*) A3 -> I: nm3,c3(K:12529:*) I -> B2: {A3,na4}k!10 |
ATTACK 347 -- (Id: 13423) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm3, c3(K:12527:*), c2(K:12525:*), nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12527:*)).out(nm3,c3(K:12527:*))] B2: () [in(m2(K:12525:*),c2(K:12525:*)).out(B2,c2(K:12525:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> B2: m2(K:12525:*),c2(K:12525:*) B2 -> I: B2,c2(K:12525:*) I -> A3: c3(K:12527:*) A3 -> I: nm3,c3(K:12527:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 348 -- (Id: 13431) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12545:*), c2(K:12542:*), {A3,na4}k!10, nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12545:*)).out(nm3,c3(K:12545:*))] B2: () [in(m2(K:12542:*),c2(K:12542:*)).out(B2,c2(K:12542:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12542:*),c2(K:12542:*) B2 -> I: B2,c2(K:12542:*) I -> B2: {A3,na4}k!10 I -> A3: c3(K:12545:*) A3 -> I: nm3,c3(K:12545:*) |
ATTACK 349 -- (Id: 13435) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm3, c3(K:12544:*), c2(K:12542:*), {A3,na4}k!10, nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12544:*)).out(nm3,c3(K:12544:*))] B2: () [in(m2(K:12542:*),c2(K:12542:*)).out(B2,c2(K:12542:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12542:*),c2(K:12542:*) B2 -> I: B2,c2(K:12542:*) I -> A3: c3(K:12544:*) A3 -> I: nm3,c3(K:12544:*) I -> B2: {A3,na4}k!10 |
ATTACK 350 -- (Id: 13441) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12552:*), nm3, c3(K:12542:*), {A3,na4}k!10, nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12542:*)).out(nm3,c3(K:12542:*))] B2: () [in(m2(K:12552:*),c2(K:12552:*)).out(B2,c2(K:12552:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A3: c3(K:12542:*) A3 -> I: nm3,c3(K:12542:*) I -> B2: m2(K:12552:*),c2(K:12552:*) B2 -> I: B2,c2(K:12552:*) I -> B2: {A3,na4}k!10 |
ATTACK 351 -- (Id: 13449) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12559:*), {A3,na4}k!10, nm3, c3(K:12525:*), nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12525:*)).out(nm3,c3(K:12525:*))] B2: () [in(m2(K:12559:*),c2(K:12559:*)).out(B2,c2(K:12559:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> A3: c3(K:12525:*) A3 -> I: nm3,c3(K:12525:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12559:*),c2(K:12559:*) B2 -> I: B2,c2(K:12559:*) I -> B2: {A3,na4}k!10 |
ATTACK 352 -- (Id: 13455) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:12557:*), nm3, c3(K:12525:*), nm4, c4(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12405:*)).out(nm4,c4(K:12405:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12525:*)).out(nm3,c3(K:12525:*))] B2: () [in(m2(K:12557:*),c2(K:12557:*)).out(B2,c2(K:12557:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A4: c4(K:12405:*) A4 -> I: nm4,c4(K:12405:*) I -> A3: c3(K:12525:*) A3 -> I: nm3,c3(K:12525:*) I -> B2: m2(K:12557:*),c2(K:12557:*) B2 -> I: B2,c2(K:12557:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 353 -- (Id: 13465) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, c2(K:12571:*), nm4, c4(K:12569:*), nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12569:*)).out(nm4,c4(K:12569:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12571:*),c2(K:12571:*)).out(B2,c2(K:12571:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> A4: c4(K:12569:*) A4 -> I: nm4,c4(K:12569:*) I -> B2: m2(K:12571:*),c2(K:12571:*) B2 -> I: B2,c2(K:12571:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 354 -- (Id: 13471) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12578:*), {A3,na4}k!10, nm4, c4(K:12569:*), nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12569:*)).out(nm4,c4(K:12569:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12578:*),c2(K:12578:*)).out(B2,c2(K:12578:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> A4: c4(K:12569:*) A4 -> I: nm4,c4(K:12569:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12578:*),c2(K:12578:*) B2 -> I: B2,c2(K:12578:*) I -> B2: {A3,na4}k!10 |
ATTACK 355 -- (Id: 13479) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
{A3,na4}k!10, nm4, c4(K:12583:*), c2(K:12569:*), nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12583:*)).out(nm4,c4(K:12583:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12569:*),c2(K:12569:*)).out(B2,c2(K:12569:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> B2: m2(K:12569:*),c2(K:12569:*) B2 -> I: B2,c2(K:12569:*) I -> A4: c4(K:12583:*) A4 -> I: nm4,c4(K:12583:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 |
ATTACK 356 -- (Id: 13485) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12590:*), {A3,na4}k!10, c2(K:12569:*), nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12590:*)).out(nm4,c4(K:12590:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12569:*),c2(K:12569:*)).out(B2,c2(K:12569:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> B2: m2(K:12569:*),c2(K:12569:*) B2 -> I: B2,c2(K:12569:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12590:*) A4 -> I: nm4,c4(K:12590:*) I -> B2: {A3,na4}k!10 |
ATTACK 357 -- (Id: 13489) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12594:*), {A3,na4}k!10, c2(K:12569:*), nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12594:*)).out(nm4,c4(K:12594:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12569:*),c2(K:12569:*)).out(B2,c2(K:12569:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> B2: m2(K:12569:*),c2(K:12569:*) B2 -> I: B2,c2(K:12569:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: {A3,na4}k!10 I -> A4: c4(K:12594:*) A4 -> I: nm4,c4(K:12594:*) |
ATTACK 358 -- (Id: 13497) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12601:*), c2(K:12598:*), {A3,na4}k!10, nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12601:*)).out(nm4,c4(K:12601:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12598:*),c2(K:12598:*)).out(B2,c2(K:12598:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12598:*),c2(K:12598:*) B2 -> I: B2,c2(K:12598:*) I -> B2: {A3,na4}k!10 I -> A4: c4(K:12601:*) A4 -> I: nm4,c4(K:12601:*) |
ATTACK 359 -- (Id: 13501) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
nm4, c4(K:12600:*), c2(K:12598:*), {A3,na4}k!10, nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12600:*)).out(nm4,c4(K:12600:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12598:*),c2(K:12598:*)).out(B2,c2(K:12598:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> B2: m2(K:12598:*),c2(K:12598:*) B2 -> I: B2,c2(K:12598:*) I -> A4: c4(K:12600:*) A4 -> I: nm4,c4(K:12600:*) I -> B2: {A3,na4}k!10 |
ATTACK 360 -- (Id: 13507) | |
Violated Constraints | Open Variables |
u1 = A3 v1 = B2 tu1 < > na3 | sk4 -> k!10 sk3 -> k!10 sk2 -> k!10 u1 -> A3 uk1 -> k!10 v1 -> B2 vk1 -> k!10 |
Knowledge | Context |
c2(K:12608:*), nm4, c4(K:12598:*), {A3,na4}k!10, nm3, c3(K:12405:*), {A3,na4}kss1, {na3}k!10, {na4}k!10, A4, A4+, A3, A3+, B2, B2+, S1, S1+, I0, . | A4: () [out(A4,{na4}k!10).in(c4(K:12598:*)).out(nm4,c4(K:12598:*))] A3: () [out(A3,{na3}k!10).in(c3(K:12405:*)).out(nm3,c3(K:12405:*))] B2: () [in(m2(K:12608:*),c2(K:12608:*)).out(B2,c2(K:12608:*)).in({A3,na4}k!10)] S1: () [in(A3,{na4}k!10).out({A3,na4}kss1).in(B2,{A3,na4}kss1).out({A3,na4}k!10)] |
Model | Intruder process |
u1(K:5:n -> A3 v1(K:5:n -> B2 | A4 -> I: A4,{na4}k!10 A3 -> I: A3,{na3}k!10 I -> S1: A3,{na4}k!10 S1 -> I: {A3,na4}kss1 I -> A3: c3(K:12405:*) A3 -> I: nm3,c3(K:12405:*) I -> S1: B2,{A3,na4}kss1 S1 -> I: {A3,na4}k!10 I -> A4: c4(K:12598:*) A4 -> I: nm4,c4(K:12598:*) I -> B2: m2(K:12608:*),c2(K:12608:*) B2 -> I: B2,c2(K:12608:*) I -> B2: {A3,na4}k!10 |