241d387e14827c88dc54381ee07cdd27 Arnau_Piqu_article_final_systematic_use_of_tools_for_detecting_computer_vulnerabilities.pdf