Abstract:Buttyan et al. proposed a simple logic and used it to revise Woo Lam protocol; without proving, they claimed that revised protocol is resistant against the interaction attacks between a protocol and itself. In this paper, in order to show that their results are incorrect, two different attacks on revised protocol are found out and set out in detail for their implementations. The fashions to construct the two attacks are essentially analogous to the ones described by Debbabi etc. except more complicated than them,The further analysis show that the logic of Buttyan etc.has no enough capacity to sufficiently capture protocol flaws,which stem from interaction of protocol itself.This logic needs to be improved.