The Power of Spike Testing: Uncovering Software Vulnerabilities