4
The System of Automatic Searching for Vulnerabilities or how to use Taint Analysis to find vulnerabilities