Research Article

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection

Table 10

Flows in GoldDream malware sample.

DATABASE_INFORMATION CONTENT_RESOLVER
DATABASE_INFORMATION NETWORK
DATABASE_INFORMATION LOG
DATABASE_INFORMATION FILE
DATABASE_INFORMATION INTENT
UNIQUE_IDENTIFIER NETWORK
NETWORK_INFORMATION SMS_MMS
NETWORK_INFORMATION FILE