“…Symbolic methods are used to reason about concurrent systems specified by rewrite theories in many ways, including: (i) cryptographic protocol verification, e.g., [10], (ii) logical LTL model checking, e.g., [2], (iii) rewriting modulo SMT and related approaches, e.g., [22,1], (iv) inductive theorem proving and program verification, e.g., [12,16], and (v) reachability logic theorem proving, e.g., [25,17,24]. One key issue is that the rewrite theories used in several of these approaches go beyond the standard notion of rewrite theory in, say [3], and also beyond the executability requirements in, say, [8].…”