Which of the following methodologies is BEST for a developer to find input validation weaknesses
in their own mobile app source code?
A.
Disassembly of mobile app executable
B.
Threat modeling
C.
Fuzz testing an app’s attack surface
D.
Single stepping an app through a debugger
Explanation: