TSTP Solution File: SWW959+1 by SnakeForV---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV---1.0
% Problem : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% Computer : n010.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 19:15:08 EDT 2022
% Result : Theorem 0.20s 0.57s
% Output : Refutation 0.20s
% Verified :
% SZS Type : Refutation
% Derivation depth : 7
% Number of leaves : 14
% Syntax : Number of formulae : 60 ( 18 unt; 0 def)
% Number of atoms : 140 ( 0 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 152 ( 72 ~; 56 |; 10 &)
% ( 4 <=>; 10 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 4 avg)
% Maximal term depth : 4 ( 2 avg)
% Number of predicates : 7 ( 6 usr; 5 prp; 0-2 aty)
% Number of functors : 18 ( 18 usr; 7 con; 0-2 aty)
% Number of variables : 60 ( 60 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f663,plain,
$false,
inference(avatar_sat_refutation,[],[f527,f565,f615,f659,f662]) ).
fof(f662,plain,
~ spl0_1,
inference(avatar_contradiction_clause,[],[f661]) ).
fof(f661,plain,
( $false
| ~ spl0_1 ),
inference(resolution,[],[f660,f476]) ).
fof(f476,plain,
~ pred_attacker(name_objective),
inference(cnf_transformation,[],[f234]) ).
fof(f234,plain,
~ pred_attacker(name_objective),
inference(flattening,[],[f170]) ).
fof(f170,negated_conjecture,
~ pred_attacker(name_objective),
inference(negated_conjecture,[],[f169]) ).
fof(f169,conjecture,
pred_attacker(name_objective),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).
fof(f660,plain,
( pred_attacker(name_objective)
| ~ spl0_1 ),
inference(resolution,[],[f517,f404]) ).
fof(f404,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f291]) ).
fof(f291,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f175]) ).
fof(f175,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X51] :
( pred_attacker(tuple_client_B_out_6(X51))
=> pred_attacker(X51) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax113) ).
fof(f517,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl0_1 ),
inference(avatar_component_clause,[],[f515]) ).
fof(f515,plain,
( spl0_1
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).
fof(f659,plain,
~ spl0_4,
inference(avatar_contradiction_clause,[],[f622]) ).
fof(f622,plain,
( $false
| ~ spl0_4 ),
inference(resolution,[],[f617,f352]) ).
fof(f352,plain,
pred_attacker(constr_CONST_4),
inference(cnf_transformation,[],[f140]) ).
fof(f140,axiom,
pred_attacker(constr_CONST_4),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax139) ).
fof(f617,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_4 ),
inference(resolution,[],[f616,f383]) ).
fof(f383,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f267]) ).
fof(f267,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_2(X0)) ),
inference(ennf_transformation,[],[f194]) ).
fof(f194,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f124]) ).
fof(f124,axiom,
! [X64] :
( pred_attacker(X64)
=> pred_attacker(tuple_client_B_in_2(X64)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax123) ).
fof(f616,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ spl0_4 ),
inference(resolution,[],[f526,f501]) ).
fof(f501,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f208]) ).
fof(f208,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax86) ).
fof(f526,plain,
( ! [X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X1)) )
| ~ spl0_4 ),
inference(avatar_component_clause,[],[f525]) ).
fof(f525,plain,
( spl0_4
<=> ! [X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X1)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).
fof(f615,plain,
~ spl0_3,
inference(avatar_contradiction_clause,[],[f597]) ).
fof(f597,plain,
( $false
| ~ spl0_3 ),
inference(resolution,[],[f572,f351]) ).
fof(f351,plain,
pred_attacker(tuple_client_A_out_1(name_A,name_I)),
inference(cnf_transformation,[],[f161]) ).
fof(f161,axiom,
pred_attacker(tuple_client_A_out_1(name_A,name_I)),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax160) ).
fof(f572,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_3 ),
inference(resolution,[],[f570,f495]) ).
fof(f495,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f252]) ).
fof(f252,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f213]) ).
fof(f213,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f120]) ).
fof(f120,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(tuple_client_B_in_5(X60)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax119) ).
fof(f570,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ spl0_3 ),
inference(resolution,[],[f523,f501]) ).
fof(f523,plain,
( ! [X2,X0] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X2)) )
| ~ spl0_3 ),
inference(avatar_component_clause,[],[f522]) ).
fof(f522,plain,
( spl0_3
<=> ! [X2,X0] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).
fof(f565,plain,
~ spl0_2,
inference(avatar_contradiction_clause,[],[f531]) ).
fof(f531,plain,
( $false
| ~ spl0_2 ),
inference(resolution,[],[f529,f375]) ).
fof(f375,plain,
pred_attacker(constr_CONST_1),
inference(cnf_transformation,[],[f143]) ).
fof(f143,axiom,
pred_attacker(constr_CONST_1),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax142) ).
fof(f529,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_2 ),
inference(resolution,[],[f346,f528]) ).
fof(f528,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ spl0_2 ),
inference(resolution,[],[f501,f520]) ).
fof(f520,plain,
( ! [X3] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X3)) )
| ~ spl0_2 ),
inference(avatar_component_clause,[],[f519]) ).
fof(f519,plain,
( spl0_2
<=> ! [X3] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X3)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).
fof(f346,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f323]) ).
fof(f323,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f218]) ).
fof(f218,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f122]) ).
fof(f122,axiom,
! [X62] :
( pred_attacker(X62)
=> pred_attacker(tuple_client_B_in_3(X62)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax121) ).
fof(f527,plain,
( spl0_1
| spl0_2
| spl0_3
| spl0_4 ),
inference(avatar_split_clause,[],[f415,f525,f522,f519,f515]) ).
fof(f415,plain,
! [X2,X3,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_3(X3)) ),
inference(cnf_transformation,[],[f330]) ).
fof(f330,plain,
! [X0,X1,X2,X3] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_5(X2)) ),
inference(rectify,[],[f271]) ).
fof(f271,plain,
! [X3,X1,X2,X0] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_5(X2)) ),
inference(flattening,[],[f270]) ).
fof(f270,plain,
! [X1,X0,X3,X2] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(tuple_client_B_in_5(X2)) ),
inference(ennf_transformation,[],[f206]) ).
fof(f206,plain,
! [X1,X0,X3,X2] :
( ( pred_attacker(tuple_client_B_in_3(X0))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
& pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X2,name_skB))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_2(X1))
& pred_attacker(tuple_client_B_in_5(X2)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f166]) ).
fof(f166,axiom,
! [X107,X109,X108,X106] :
( ( pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
& pred_attacker(tuple_client_B_in_5(X108))
& pred_attacker(tuple_client_B_in_3(X107))
& pred_attacker(tuple_client_B_in_2(X109))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax165) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12 % Problem : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% 0.13/0.13 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.13/0.34 % Computer : n010.cluster.edu
% 0.13/0.34 % Model : x86_64 x86_64
% 0.13/0.34 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34 % Memory : 8042.1875MB
% 0.13/0.34 % OS : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34 % CPULimit : 300
% 0.13/0.34 % WCLimit : 300
% 0.13/0.34 % DateTime : Tue Aug 30 21:11:13 EDT 2022
% 0.13/0.34 % CPUTime :
% 0.20/0.55 % (23152)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.20/0.55 % (23152)Refutation not found, incomplete strategy% (23152)------------------------------
% 0.20/0.55 % (23152)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.55 % (23152)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.55 % (23152)Termination reason: Refutation not found, incomplete strategy
% 0.20/0.55
% 0.20/0.55 % (23152)Memory used [KB]: 6012
% 0.20/0.55 % (23152)Time elapsed: 0.133 s
% 0.20/0.55 % (23152)Instructions burned: 3 (million)
% 0.20/0.55 % (23152)------------------------------
% 0.20/0.55 % (23152)------------------------------
% 0.20/0.55 % (23168)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.20/0.56 % (23160)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.20/0.56 % (23160)Instruction limit reached!
% 0.20/0.56 % (23160)------------------------------
% 0.20/0.56 % (23160)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.56 % (23160)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.56 % (23160)Termination reason: Unknown
% 0.20/0.56 % (23160)Termination phase: Property scanning
% 0.20/0.56
% 0.20/0.56 % (23160)Memory used [KB]: 1663
% 0.20/0.56 % (23160)Time elapsed: 0.007 s
% 0.20/0.56 % (23160)Instructions burned: 3 (million)
% 0.20/0.56 % (23160)------------------------------
% 0.20/0.56 % (23160)------------------------------
% 0.20/0.56 % (23168)First to succeed.
% 0.20/0.57 % (23168)Refutation found. Thanks to Tanya!
% 0.20/0.57 % SZS status Theorem for theBenchmark
% 0.20/0.57 % SZS output start Proof for theBenchmark
% See solution above
% 0.20/0.57 % (23168)------------------------------
% 0.20/0.57 % (23168)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.57 % (23168)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.57 % (23168)Termination reason: Refutation
% 0.20/0.57
% 0.20/0.57 % (23168)Memory used [KB]: 6268
% 0.20/0.57 % (23168)Time elapsed: 0.155 s
% 0.20/0.57 % (23168)Instructions burned: 8 (million)
% 0.20/0.57 % (23168)------------------------------
% 0.20/0.57 % (23168)------------------------------
% 0.20/0.57 % (23145)Success in time 0.215 s
%------------------------------------------------------------------------------