Fig. 3From: An enhanced state-aware model learning approach for security analysis in lightweight protocol implementationsFour layers of State-aware approachBack to article page