this seems overly complicated to me. it all starts with getting a malicious app on the users phone. if you can get the app there, why use such a complicated attack when a root kit would do alot more for you?
it's a great write up on how caching can be used maliciously but the demonstrated usage seems like the wrong way to use it