Return to Article Details Malicious Interfaces: strategies for personal data collection in apps Download Download PDF