Assessing the Vulnerability of Your Cell Application