Text this: A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects