“…Firstly, one of the above trackability attack strategies has to be implemented in a model in a trace-based verification tool. On the one hand, selective blocking comes almost for free in any DY [20] tool: the attacker can and will try to block any message, and the "selective" nature is achieved by writing a model with a set of rules, restrictions and/or predicates, which quantify over a particular ID whose messages were "selectively" blocked 18 . On the other hand, forced conditions are implicitly implemented in any DY tool: the DY attacker will try arbitrary inputs forcing both the if and the else branch of all protocol tests.…”