Fig. 2From: DroidEcho: an in-depth dissection of malicious behaviors in Android applicationsThe architecture of the systemBack to article page