This method is based on generating a hash of the application by
breaking it down into small chunks and combining their hashes.
They also remove string operands that can easily be altered from
the instructions prior to hashing, in order to prevent common
obfuscation techniques. They have created an application called
DroidMOSS. They state that although their system is very robust,
detection may fail if big chunks of code have been added to the
original application