From model-checking to automated testing of security protocols: Bridging the gap