Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective | IEEE Conference Publication | IEEE Xplore