Research Article

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

Figure 2

URL building, string analysis, and interslice dependency analysis.