This section presents a brief evaluation that shows the utility and the applicability of the proposed security assessment tool, discussing the differences between doing an automatic and a manual analysis, and presenting the preliminary
results.
The analysis is based on information gathered from 30 Android devices.
We are aware that the sample space is still small, but the focus of this paper is to present the approach and the
tool, and not to do an extensive analysis of the typical security of Android devices (this is a work we intended to do as soon as we have a reasonable data set).