Research Article

The Dangers of Rooting: Data Leakage Detection in Android Applications

Figure 7

The histogram shows the results of all ranges of Table 2.