A Protocol's Life after Attacks