[4] Dalvik Virtual Machine, 2012. ,
the OVAL Interpreter reference implementation, 2012. ,
oasis-open.org/committees/download, 2012. ,
Towards autonomic risk-aware security configuration, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, pp.722-725, 2008. ,
DOI : 10.1109/NOMS.2008.4575198
The Technical Specification for the Security Content Automation Protocol (SCAP) NIST Special Publication, 2009. ,
Supporting Vulnerability Awareness in Autonomic Networks and Systems with OVAL, Proceedings of the 7th IEEE International Conference on Network and Service Management (CNSM'11), 2011. ,
Towards the assessment of distributed vulnerabilities in autonomic networks and systems, 2012 IEEE Network Operations and Management Symposium, 2012. ,
DOI : 10.1109/NOMS.2012.6211916
Towards machine-assisted formal procedures for the collection of digital evidence, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.32-35, 2011. ,
DOI : 10.1109/PST.2011.5971960
Automatically securing permission-based software by reducing the attack surface: an application to Android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, 1206. ,
DOI : 10.1145/2351676.2351722
URL : https://hal.archives-ouvertes.fr/hal-00700074
A Study of Android Application Security, Proceedings of the 20th USENIX Conference on Security, 2011. ,
Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.50-57, 2009. ,
DOI : 10.1109/MSP.2009.26
A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, 2011. ,
DOI : 10.1145/2046614.2046618
Modelling the Security Ecosystem -The Dynamics of (In)Security, Proceedings of the Workshop on the Economics of Information Security, 2009. ,
Juxtapp and DStruct: Detection of Similarity Among Android Applications, 2012. ,
Google Android: A Comprehensive Security Assessment, IEEE Security & Privacy Magazine, vol.8, issue.2, pp.35-44, 2010. ,
DOI : 10.1109/MSP.2010.2
Gaussian elimination is not optimal, Numerische Mathematik, vol.13, issue.4, pp.354-356, 1007. ,
DOI : 10.1007/BF02165411
All Your Droid Are Belong To Us: A Survey of Current Android Attacks, Proceedings of the 5th USENIX Conference on Offensive Technologies (WOOT'11), pp.10-10, 2011. ,
Specification for the Extensible Configuration Checklist Description Format (XCCDF). NIST, 2012. ,