Table 1.
Outline of the examined apps.
Fig 1.
Overview of the followed methodology.
Table 2.
Overview of requested permissions per app vis-à-vis the baseline.
Table 3.
TLS server security level rating of external URLs per app.
Table 4.
Categorisation of sensitive API calls discovered in the apps.
Table 5.
Potentially privacy-invasive API call groups per app.
Table 6.
Potential weaknesses and other security issues per app.
Table 7.
Potentially vulnerable components in the manifest file of each app.
Table 8.
Shared library issues per app.
Table 9.
Outdated third-party software components per app.
Fig 2.
Issues identified through taint analysis.
Table 10.
Dynamic analysis results.