This paper focuses on custom rom’s and check for security misconfiguration’s which could yield to device compromise.
detect application frameworks, current approach, enhancement and prevention.