We evaluated M-Perm and P-Lint using several oracle Android apps. These include minimal calendar, camera, SMS messaging, contact storage and location recording apps. We then created multiple versions of these apps, and injected PRIs into them with the goal of covering numerous possible cases in which a PRI may occur. We then ran M-Perm and P-Lint on each of these app versions, identifying all TP, FP, FN and TN for PRIs. Both tools obtained a precision and recall value of 1.00. Although largely elementary, these results provided confidence in the ability of these tools in our study. Oracle apps are available here. Although both tools used in our study are able to decompile and analyze apk files, decompilation was not performed as the source code for subject apps was readily available. In this analysis we created our own apps to provide a greater amount of confidence that we were aware of all PRIs in the this oracle, whereas manually identifying PRIs in existing apps would have been a time-consuming and largely imperfect task.