fig6-sample-malicious-app