Research Article

The Dangers of Rooting: Data Leakage Detection in Android Applications

Table 4

Number of apps that are potentially vulnerable to a MITM attack.

ā€‰Number of appsMITM vulnerability

Tools21
Productivity1612
Social41
Communication106
Finance3517