Research Article
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection
Table 11
Flows in GingerMaster malware sample.
| DATABASE_INFORMATION LOG | DATABASE_INFORMATION NETWORK | DATABASE_INFORMATION FILE | DATABASE_INFORMATION INTENT | UNIQUE_IDENTIFIER NETWORK | UNIQUE_IDENTIFIER INTENT | NETWORK_INFORMATION NETWORK | NETWORK_INFORMATION INTENT | NETWORK_INFORMATION LOG | LOCATION_INFORMATION LOG |
|
|