Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Mobile Information Systems
/
2018
/
Article
/
Tab 5
/
Research Article
The Dangers of Rooting: Data Leakage Detection in Android Applications
Table 5
Correlation between the installation count and MITM vulnerability.
Installation count
MITM vulnerability
1,000,000,000–5,000,000,000
3
500,000,000–1,000,000,000
2
100,000,000–500,000,000
5
50,000,000–100,000,000
1
10,000,000–50,000,000
3
1,000,000–5,000,000
5
500,000–1,000,000
1
100,000–500,000
11
50,000–100,000
3
10,000–50,000
1
5,000–10,000
0
50–5,000
1