Research Article
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection
Table 10
Flows in GoldDream malware sample.
| DATABASE_INFORMATION CONTENT_RESOLVER | DATABASE_INFORMATION NETWORK | DATABASE_INFORMATION LOG | DATABASE_INFORMATION FILE | DATABASE_INFORMATION INTENT | UNIQUE_IDENTIFIER NETWORK | NETWORK_INFORMATION SMS_MMS | NETWORK_INFORMATION FILE |
|
|