IAST: A New Approach to Finding Security Vulnerabilities