Research Article

The Dangers of Rooting: Data Leakage Detection in Android Applications

Table 5

Correlation between the installation count and MITM vulnerability.

Installation countMITM vulnerability

1,000,000,000–5,000,000,0003
500,000,000–1,000,000,0002
100,000,000–500,000,0005
50,000,000–100,000,0001
10,000,000–50,000,0003
1,000,000–5,000,0005
500,000–1,000,0001
100,000–500,00011
50,000–100,0003
10,000–50,0001
5,000–10,0000
50–5,0001