In contrary to the general belief that the damage imposed by
an Android malware is limited to an application’s sandbox,
the permission escalation attack allow amalicious application
to collaborate with other applications so as to access critical
resources without requesting for corresponding permissions
explicitly