| Name of Attacks | Description |
| Heading Eavesdropping | The attacker listens to information sent via the protocol. |
| Modification | The attacker changes the information sent via the protocol |
| Replay | The attacker records information sent in the protocol and forwards it to the same or a different party during protocol runs. |
| Replay | The attacker involves in the run of a protocol earlier to a run by the legitimate parties. |
| Reflection | The attacker sends protocol messages back to the party who sent them. |
| Denial of Service | The attacker prevents legitimate parties from finalizing the protocol. |
| Cryptanalysis | The attacker gets some useful control from the protocol to help in cryptanalysis. |
| Certificate Manipulation | The attacker picks or alters certificate information to attack one or more protocol runs. |
| Protocol Interaction | The attacker selects a new protocol to interact with a well-known protocol. |