Is finding security holes a good idea? | IEEE Journals & Magazine | IEEE Xplore