operation
and to provide evidence of the utility of the obtained results for identifying security threats related to malicious
or bad design practices. Three cases are presented, a short description of these cases is given in Table I. A test version
of GARMDROID is available at www.garmdroid.org.