“…Violations were detected in most cases within seconds, and generally under 5 min. The next step was to generate an optimized verifier in order to execute exploration in some of the three main search modes: exhaustive verification, bitstate, or hash-compact approximation, (Bozga et al, 1999;Holzmann, 1997Holzmann, , 2003Ober, Graf, & Ober, 2004;Prigent et al, 2002;Vlaovic et al, 2017;Vlaovič et al, 2007;Vreže et al, 2009).…”