Attacks: Our proposed modeling does not attempt to enumerate
various possible attacks and individual attackers. Rather, any values
being relayed by an untrusted entity are modeled as outputs which
can be in a "good” (correct value), "bad” (malicious value) or "old”
(replayed value) state so the tool can model any modification or
replay of values.