Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration