What are the most commonly used persistent techniques by Android malware. That is to survive on device after reboot. In windows malware they change registry entries to auto start, Android malware should use similar techniques, couldn't find much details when googled. Any help is much appreciated. Thanks
No comments:
Post a Comment