fig_7-code-to-steal-call-logs