This adds a verification protocol to the database which allows the database to be used in vulnerability analysis experiments.
We do so several things to create a verification protocol: