Therefore, they would not
be capable of detecting applications that claim to be legitimate
applications by just imitating their name and application icon,
but using a completely different codebase (criterion 4), or when
advanced obfuscation techniques have been applied