Research Article

Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs

Figure 6

Two paths of different CFGs having the same labels.
(a)
(b)