A theoretical workflow for the verification of embedded threats on mobile devices | IEEE Conference Publication | IEEE Xplore