Install Hijacking: Definition, Techniques, and Prevention Strategies