Research Article
Runtime Detection Framework for Android Malware
Figure 4
Example of suffix tree generation/modification: dotted line edges denote failure transition, and solid line edges denote state transitions. Ukkonen’s algorithm is utilized to construct the suffix tree.