“…Several studies have explored the introduction of fine controls over permissions at the framework, the middle layer, or the operating system-level using different strategies (Beresford et al, 2011;Zhou et al, 2011;Brutschy et al, 2015;Nauman et al, 2010;Jeon et al, 2012;Liu et al, 2016b;Caputo et al, 2021). Proposed techniques such as Mockdroid (Beresford et al, 2011), and TISSA (Zhou et al, 2011) facilitate users to control access whenever access to the resource is attempted by providing dummy information instead of the real one.…”