Research Article

Detection and Visualization of Android Malware Behavior

Figure 5

User interface of the Sink. (a) Choosing the application, (b) selecting the menu for permissions, (c) electing the permissions, and (d) steps of the monitoring process.