Research Article

The Dangers of Rooting: Data Leakage Detection in Android Applications

Figure 8

A graphical representation of the problem concerning the delegation scheme implemented by some applications.