Figure 4: System architecture to mitigate push notification-based malware.