Since June 2015, we have seen a steady growth in the number of mobile malware attacks that use superuser privileges (root access) on the device to achieve their goals. Root access is incompatible with the operating system’s security model because it violates the principle that applications should be isolated from each other and from the […]