How to Deal with Opaque Vendors: Securing Components Without Source Code Access