1. Almomani, I. M., & Al Khayer, A. (2020). A comprehensive analysis of the android permissions system. IEEE access, 8, 216671–216688.
2. Au, K. W. Y., Zhou, Y. F., Huang, Z., & Lie, D. (2012). Pscout: Analyzing the android permission specification. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 217–228).
3. Bhandari, S., Jaballah, W. B., Jain, V., Laxmi, V., Zemmari, A., Gaur, M. S., Mosbah, M., & Conti, M. (2017). Android inter-app communication threats and detection techniques. Computers & Security, 70, 392–421.
4. Biswas, S., Sohel, M., Sajal, M. M., Afrin, T., Bhuiyan, T., & Hassan, M. M. (2018). A study on remote code execution vulnerability in web applications. In International Conference on Cyber Security and Computer Science (ICONCS 2018) (pp. 50–57).
5. Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A. R., & Shastry, B. (2012). Towards taming privilege-escalation attacks on android. In NDSS, 17, 19.