This document presents a study on approximating software attack surfaces using stack traces from crash dumps. It aims to address practitioner concerns with previous work, such as binary prioritization being not actionable and requiring large datasets. The study evaluates using the Risk-Based Attack Surface Approximation (RASA) approach at the source code file level on Mozilla Firefox and Windows crashes. It finds that RASA can effectively prioritize security efforts at the file level using orders of magnitude less data. Random sampling of crash data still effectively identifies vulnerable files, addressing concerns about not storing all crashes. The study concludes RASA satisfies previous complaints and provides evidence it can work for new systems with limited data.