A set of results are presented in this section with a
twofold purpose to demonstrate GARMDROID operation
and to provide evidence of the utility of the obtained
results for identifying security threats related to malicious
or bad design practices. Three cases are presented, a short
description of these cases is given in Table I. A test version
of GARMDROID is available at www.garmdroid.org.