EXPLOITING ANDROID: RCE APPLICATIONS, WITH EXAMPLES, TAKING ADVANTAGE OF LESSER-KNOWN ATTACK SURFACES rce malware,
CIRCUMVENTION OF heuristics AND malware detection: operating under the radar by exploiting lesser-known blind spots