Identifying and Mitigating Misuse of Secrets in Android with Dynamic Analysis Techniques