From: DroidEcho: an in-depth dissection of malicious behaviors in Android applications
Attack | Percent | Supported by DroidEcho |
---|---|---|
Privacy Leakage | 31.4 | \(\checkmark \) |
Information Interception | 11.6 | \(\checkmark \) |
Content Tampering | 13.4 | \(\checkmark \) |
Service Abuse | 31.4 | \(\checkmark \) |
Resource Depletion | 1.8 | \(\checkmark \) |
Fishing | 1.7 | ✗ |
Adware | 2.3 | ✗ |
Privilege Escalation | 6.4 | ✗ |