(a) Result shown following the analysis of both kernel and userspace traces when the constraints are satisfied
(b) Result shown following the analysis of both kernel and userspace traces when the constraints are not satisfied
(c) Result following the analysis of the userspace trace only to simulate a case where we would not have any kernel trace, thus making the state system unavailable for the analysis
Figure 16: Results of the analysis using the model-based constraints on userspace and kernel traces.