This paper focuses on custom romās and check for security misconfigurationās which could yield to device compromise.
detect application frameworks, current approach, enhancement and prevention.