“…In previous work, verification of protocols susceptible to type flaw attacks has been attempted using various formalisms [12,10,8,7,25,11,24]. The attacks considered generally involve simple 'type confusion' attacks in which segments of one type are confused with segments of another type, or in the more advanced models, in which a segment of one type is confused with the concatenation of two or more other segments of varying types [18].…”