I am working on a very simple attack on a Java program. Let\'s say that someone made a for loop that computes a value (from a pre existing one) and stores in it in a HashMap