From what we could know, our work addresses the first and most extensive scientific classification of security deficiencies in Android […]