. Apple-ios, [4] Dalvik Virtual Machine, 2012.

. Ovaldi, the OVAL Interpreter reference implementation, 2012.

. Vulnxml, oasis-open.org/committees/download, 2012.

M. S. Ahmed, E. Al-shaer, M. M. Taibah, M. Abedin, and L. Khan, Towards autonomic risk-aware security configuration, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, pp.722-725, 2008.
DOI : 10.1109/NOMS.2008.4575198

J. Banghart and C. Johnson, The Technical Specification for the Security Content Automation Protocol (SCAP) NIST Special Publication, 2009.

M. Barrère, R. Badonnel, and O. Festor, Supporting Vulnerability Awareness in Autonomic Networks and Systems with OVAL, Proceedings of the 7th IEEE International Conference on Network and Service Management (CNSM'11), 2011.

M. Barrère, R. Badonnel, and O. Festor, Towards the assessment of distributed vulnerabilities in autonomic networks and systems, 2012 IEEE Network Operations and Management Symposium, 2012.
DOI : 10.1109/NOMS.2012.6211916

M. Barrère, G. Betarte, and M. Rodríguez, Towards machine-assisted formal procedures for the collection of digital evidence, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.32-35, 2011.
DOI : 10.1109/PST.2011.5971960

A. Bartel, J. Klein, M. Monperrus, and Y. L. Traon, Automatically securing permission-based software by reducing the attack surface: an application to Android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, 1206.
DOI : 10.1145/2351676.2351722

URL : https://hal.archives-ouvertes.fr/hal-00700074

W. Enck, D. Octeau, P. Mcdaniel, and S. Chaudhuri, A Study of Android Application Security, Proceedings of the 20th USENIX Conference on Security, 2011.

W. Enck, M. Ongtang, and P. Mcdaniel, Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.50-57, 2009.
DOI : 10.1109/MSP.2009.26

A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, 2011.
DOI : 10.1145/2046614.2046618

S. Frei, D. Schatzmann, B. Plattner, and B. Trammel, Modelling the Security Ecosystem -The Dynamics of (In)Security, Proceedings of the Workshop on the Economics of Information Security, 2009.

S. Li, Juxtapp and DStruct: Detection of Similarity Among Android Applications, 2012.

A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev et al., Google Android: A Comprehensive Security Assessment, IEEE Security & Privacy Magazine, vol.8, issue.2, pp.35-44, 2010.
DOI : 10.1109/MSP.2010.2

V. Strassen, Gaussian elimination is not optimal, Numerische Mathematik, vol.13, issue.4, pp.354-356, 1007.
DOI : 10.1007/BF02165411

T. Vidas, D. Votipka, and N. Christin, All Your Droid Are Belong To Us: A Survey of Current Android Attacks, Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11), pp.10-10, 2011.

N. Ziring and S. D. Quinn, Specification for the Extensible Configuration Checklist Description Format (XCCDF). NIST, 2012.