Evaluating model checking for cyber threats code obfuscation identification