A set of results are presented in this section with a twofold purpose to demonstrate GARMDROID operation
and to provide evidence of the utility of the obtained results for identifying security threats related to malicious
or bad design practices. Three cases are presented, a short description of these cases is given in Table I. A test version
of GARMDROID is available at www.garmdroid.org.