Research Article

Analyzing User Awareness of Privacy Data Leak in Mobile Applications

Figure 2

Permission analysis of original app versus imitation app (fake and malicious).