Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation