The commonplace nature of smartphones has revolutionized our lives, offering unprecedented flexibility. However, this connectivity comes at a price, as malicious actors can exploit remote access vulnerabilities to conduct phone surveillance. Surveillance techniques employ a spectrum of methods, including the use of harmful apps, leveraging softwar