Research Article

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection

Table 11

Flows in GingerMaster malware sample.

DATABASE_INFORMATION LOG
DATABASE_INFORMATION NETWORK
DATABASE_INFORMATION FILE
DATABASE_INFORMATION INTENT
UNIQUE_IDENTIFIER NETWORK
UNIQUE_IDENTIFIER INTENT
NETWORK_INFORMATION NETWORK
NETWORK_INFORMATION INTENT
NETWORK_INFORMATION LOG
LOCATION_INFORMATION LOG