Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis