Return to Article Details An assessment of the detection and evasion scenario of Android root access Download Download PDF