How do developers choose tools to identify and avoid vulnerabilities in embedded software for automobiles? How do developers choose tools to identify and avoid vulnerabilities in embedded software for automobiles?