There are several methods that are used to find new security vulnerabilities: • Source code analysis, • Binary file analysis (static and dynamic (runtime) analysis), • Runtime analysis of API functions, • Fuzzing methods (fault injection) and • Hybrid methods (various combinations of above methods).