Figure 1: The overall workflow of static state security analysis.