Research Article

Design and Analysis of Push Notification-Based Malware on Android

Figure 3

Attack procedure of push notification-based backdoor.