W. Enck, P. Gilbert, B. Gon-chun, L. P. Cox, J. Jung et al., TaintDroid, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
DOI : 10.1145/2619091

B. Gu, X. Li, L. Gang, A. Champion, Z. Chen et al., D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources, 2013 Proceedings IEEE INFOCOM, 2013.
DOI : 10.1109/INFCOM.2013.6566866

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.419

H. Yin, D. Song, E. Manuel, C. Kruegel, and E. Kirda, Panorama, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315261

L. Yan and H. Yin, DroidScope: Seamlessly reconstructing os and dalvik semantic views for dynamic android malware analysis, Proceedings of the 21st USENIX Security Symposium, 2012.

R. Andriatsimandefitra, S. Geller, V. Viet-triem, and . Tong, Designing information flow policies for Android's operating system, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364161

S. Geller, V. Viet-triem, L. Tong, and . Mé, Bspl: a language to specify and compose fine-grained information flow policies, Proceedings of the The Seventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE)
URL : https://hal.archives-ouvertes.fr/hal-00909400

S. Geller, C. Hauser, F. Tronel, V. Viet-triem, and . Tong, Information Flow Control for Intrusion Detection Derived from MAC Policy, 2011 IEEE International Conference on Communications (ICC), 2011.
DOI : 10.1109/icc.2011.5962660

URL : https://hal.archives-ouvertes.fr/hal-00647116

C. Hauser, F. Tronel, J. Reid, and C. Fidge, A taint marking approach to confidentiality violation detection, Australasian Information Security Conference (AISC), 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736045

C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-hartman, Linux security module framework, OLS2002 Proceedings, 2002.