Exploiting Trade-offs in Symbolic Execution for Identifying Security Bugs