A. Armando, A. Costa, and . Merlo, Formal Modeling and Reasoning about the Android Security Framework, 7th Intl Sym on Trustworthy Global Computing, 2012.
DOI : 10.1007/978-3-642-41157-1_5

D. Barrera, H. Kayacik, P. C. Van-oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10
DOI : 10.1145/1866307.1866317

A. Belenko and D. Sklyarov, Secure Password Managers " and " Military-Grade Encryption " on Smartphones: Oh, Really?, 2012.

K. Bhargavan and A. Delignat-lavaud, Web-based attacks on host-proof encrypted storage, 6th USENIX Workshop on Offensive Technologies (WOOT'12)
URL : https://hal.archives-ouvertes.fr/hal-00863383

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.
DOI : 10.1109/CSFW.2001.930138

B. Blanchet and A. Chaudhuri, Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage, 2008 IEEE Symposium on Security and Privacy (sp 2008)
DOI : 10.1109/SP.2008.12

T. Bray, Recent Android app update prevents third-party apps from using com.google.android.gm.permission.READ GMAIL. Why? productforums. google.com, 2011.

P. Chan, L. Hui, and S. Yiu, DroidChecker, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12
DOI : 10.1145/2185448.2185466

A. Chaudhuri, Language-based security on Android, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09
DOI : 10.1145/1554339.1554341

P. Chia, Y. Yamamoto, and N. Asokan, Is this app safe? A large scale study on application permissions and risk signals, WWW '12

M. Conti, B. Nguyen, and . Crispo, CRePE: Context-Related Policy Enforcement for Android, 13th Intl Conf on Information Security (ISC '10)
DOI : 10.1007/978-3-642-18178-8_29

L. Davi, . Dmitrienko, M. Sadeghi, and . Winandy, Privilege Escalation Attacks on Android, 13th Intl Conf on Information Security (ISC '10)
DOI : 10.1007/978-3-642-18178-8_30

M. Dietz, Y. Shekhar, . Pisetsky, D. Shu, and . Wallach, Quire: Lightweight provenance for smart phone operating systems, 20th USENIX Conf on Security, 2011.

W. Enck, . Gilbert, . Chun, . Cox, . Jung et al., TaintDroid, 9th USENIX Conf on Operating Systems Design and Implementation (OSDI '10)
DOI : 10.1145/2619091

W. Enck, P. Ongtang, and . Mcdaniel, On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09
DOI : 10.1145/1653662.1653691

A. Felt, . Chin, . Hanna, D. Song, and . Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11
DOI : 10.1145/2046707.2046779

A. Felt, . Wang, . Moshchuk, E. Hanna, and . Chin, Permission re-delegation: attacks and defenses, 20th USENIX Conf on Security

E. Fragkaki, . Bauer, D. Jia, and . Swasey, Modeling and Enhancing Android???s Permission System, ESORICS 2012
DOI : 10.1007/978-3-642-33167-1_1

A. Fuchs, J. Chaudhuri, and . Foster, SCanDroid: Automated security certification of android applications, 2009.

. Google, Android 4.1 Compatibility Definition, p.7

P. Hornyack, . Han, . Jung, and . Schechter, These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11
DOI : 10.1145/2046707.2046780

M. Nauman, X. Khan, and . Zhang, Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
DOI : 10.1145/1755688.1755732

. Nielsenwire, State of the appnation a year of change and growth in u.s. smartphones. blog.nielsen.com/ nielsenwire/online_mobile/state-of-the-appnation-\%E2\%80\ %93-a-year-of-change-and-growth-in-u-s-smartphones, p.16, 2012.

D. Schreckling, . Posegga, M. Köstler, and . Schaff, Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for??Android, 6th IFIP WG 11.2 Intl Conf on Inf Security Theory and Practice, p.12
DOI : 10.1016/j.istr.2012.10.006

S. Shekhar, D. Dietz, and . Wallach, Adsplit: separating smartphone advertising from applications, 21st USENIX Conf on Security (SEC '12)

R. Stevens, C. Gibler, . Crussell, H. Erickson, and . Chen, Investigating user privacy in android ad libraries Krishnaraj Varma's Blog, MoST 2012: Mobile Security Technologies. 28. K Varma. Security permissions in android. Accessed 9, 2010.

R. Xu, H. Sa¨?disa¨?di, and R. Anderson, Aurasium: practical policy enforcement for android applications, 21st USENIX Conf on Security (SEC '12)