Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications