“…1) Security in Android Applications: Android malware and vulnerabilities in Android apps are characterized by a novel set of flaws that exploit user level weaknesses and the issues in security mechanisms of the Android OS. For instance, Androidspecific attacks include (i) privileges/permissions escalation through pairs of infected apps that exploit inter-application communication or misconfigured apps [10]- [12], [35], [36], (ii) applications tapjacking/hijacking by apps repackaging and substitution [26], (iii) information leaking through covert channels [37], [38], (iv) SSL vulnerabilities in hybrid [33] and native apps [32], (v) security issues introduced by third party libraries [34], and (vi) security issues introduced by OS customizations [28]. These novel attacks, in addition to classic security attacks induced by malware (e.g., DoS), have been widely studied by the community and several approaches have been proposed for their detection and mitigation, such as TaintDroid [39], COVERT [10], [11], FlowDroid [40], MudFlow [41], Chabada [42], Q-Floid [43], and AppInspector [44].…”