“…Copes (Bartel et al, 2012), Leakminer (Yang & Yang, 2012), Riskranker (Grace et al, 2011), A3 (Luoshi et al, 2013) and (Gascon et al, 2013) Inter-component call graph (ICCG) et al (2014) Control flow graph (CFG) Woodpecker (Grace et al, 2012b), Flowdroid (Steven Arzt et al, 2014), Dendroid (Suarez-Tangil et al, 2014Sahs & Khan, 2012), Asdroid (Huang et al, 2014a), Anadroid (Shuying Liang et al, 2013, Adrisk (Grace et al, 2012a), and Dexteroid (Junaid, Liu & Kung, 2016a) Dependency graph CHEX (Lu et al, 2012), Dnadroid (Crussell, Gibler & Chen, 2012), Droidlegacy (Deshotels, Notani & Lakhotia, 2014b) and (Zhou et al, 2013) Others. Besides machine learning and graph, several security practitioners adopted different methods, such as Normalized Compression Distance (NCD).…”