Research Article

The Dangers of Rooting: Data Leakage Detection in Android Applications

Figure 3

A diagram that shows how Xposed works in detail while intercepting a method.