A case study in detecting software security vulnerabilities using constraint optimization | IEEE Conference Publication | IEEE Xplore