Return to Article Details A formal approach for the verification of the permission-based security model of Android Download Download PDF