This talk will present a brief overview of automated program analysis such as fuzzing, symbolic execution, and conservative static analysis. These techniques can be used to detect various bugs in programs, including buffer overflows which may create security vulnerabilities. I will then describe the methodology used by the abstract interpretation community to develop conservative static analyses, and comment ongoing research efforts (and struggles!) we encounter within Mopsa, an open-source static analysis platform I am co-developing.