Similar Items: Discovering ePassport Vulnerabilities using Bisimilarity