Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations | IEEE Conference Publication | IEEE Xplore