ethical-hacker video for an independent cybersecurity researcher has contacted your company to prove a buffer overflow vulnerability exists in one of your
An independent cybersecurity researcher has contacted your company to prove a buffer overflow vulnerability exists in one of your applications. Which technique would have been most likely to identify this vulnerability in your application during development?