: . 中国科技论文在线 http:/C caller to callee, and construct the ICC model. Then the runtime sensitive path trigger detection algorithm is given. And component hijacking attacks are detected by analyzing the intent abnormity. Finally, we analyze the modeling and detection efficiency, and compare with the relevant methods. Through analyzing fifty-seven applications in real-world partly verify the effectiveness of the proposed method. 35 Key words: Android; Inter-component communication; Intents; Component hijacking; Run-time detection