Researchers Show How SQLite Can Be Modified to Attack Apps