“…A paramount example is the volume of research focused on detecting vulnerabilities in Android apps (see e.g., [4,5,6,7,8,9,10,11,12,13]). The Android OS and devices have been also investigated in the context of previous studies aimed at categorizing their security weaknesses and exploits (e.g., [14,15,16,17,18,19,20,21]).…”