Research Article

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

Figure 3

Number of dangerous permissions.