EXPLOITING ANDROID: RCE APPLICATIONS, WITH EXAMPLES, TAKING ADVANTAGE OF LESSER-KNOWN ATTACK SURFACES