Research Article
Detection and Visualization of Android Malware Behavior
Figure 5
User interface of the Sink. (a) Choosing the application, (b) selecting the menu for permissions, (c) electing the permissions, and (d) steps of the monitoring process.