“…3 presents the three main categories of Android malware detection techniques, the first category is logic-based techniques ( Lee et al, 2014 ; Zhang, She & Qian, 2015a ), based on hard-coded safe lists and predefined alarms stored in text files or a small database like Amamra ( Amamra, Robert & Talhi, 2015 ). The second category is signature based malware detection techniques ( Niazi et al, 2015 ; Tchakounté et al, 2021 ), it based the malware detection on comparing the suspicious application with malware application signature. The third category of Android malware detection uses machine learning (ML) classification algorithms to classify the application as benign or malware ( Afonso et al, 2015 ; Alzaylaee, Yerima & Sezer, 2016 ; Amamra, Robert & Talhi, 2015 ; Baskaran & Ralescu, 2016 ; Canfora et al, 2016 ; Canfora et al, 2015c ; Castellanos et al, 2016 ; Faruki et al, 2015a ; Feizollah et al, 2015 ; Fratantonio et al, 2016 ; Kurniawan, Rosmansyah & Dabarsyah, 2015 ; Lei et al, 2015 ; Lindorfer, Neugschwandtner & Platzer, 2015 ; Lopez & Cadavid, 2016 ; Meng et al, 2016 ; Nissim et al, 2016 ; Spreitzenbarth et al, 2015 ; Spreitzer et al, 2016 ; Wang & Wu, 2015 ; Wu et al, 2016 ; Xu et al, 2016 ; Yerima, Sezer & Muttik, 2014 ; Yuan, Lu & Xue, 2016 ; Zhang, Breitinger & Baggili, 2016 ).…”