Applying formal methods to an information security device: An experience report | IEEE Conference Publication | IEEE Xplore