Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Mobile Information Systems
/
2018
/
Article
/
Tab 4
/
Research Article
The Dangers of Rooting: Data Leakage Detection in Android Applications
Table 4
Number of apps that are potentially vulnerable to a MITM attack.
ā
Number of apps
MITM vulnerability
Tools
2
1
Productivity
16
12
Social
4
1
Communication
10
6
Finance
35
17