Evaluation Of An Architectural-Level Approach For Finding Security Vulnerabilities