“…Similarly, prior work has also focused on benign but vulnerable Android applications, and proposed techniques to detect or fix vulnerabilities such as cryptographic API misuse API [30,34,35,97] or unprotected application interfaces [16,37,57]. Moreover, these techniques have often been deployed as modifications to Android's permission enforcement [12,13,17,26,32,33,37,40,45,77,83,85,93,96,112], SDK tools [7,36,104], or inline reference monitors [9,10,18,52,105]. While this paper demonstrates the evaluation of only a small subset of these tools with SE, our experiments demonstrate that SE has the potential to impact nearly all of them.…”