Best Practice for Suspicious Android Apps