From Model-checking to Automated Testing of Security Protocols: Bridging the Gap