technologies and the popularity of mobile devices. Accordingly, techniques have been
introduced for identifying, classifying, and defending against mobile threats utilizing static,
dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while
dynamic techniques are expensive. On-device techniques are evasion, while off-device
techniques need being always online. To address some of those shortcomings, we …