http://www.cvedetails.com/vulnerability-list/vendor id-1224 ,
Dernì ere visite en mai 2013. [10] L'API Apache HttpCore ,
https://github.com/ OVALProject/Sandbox ,
http://source.android.com/tech/security ,
http://oval.mitre.org/documents/docs-06/an introduction to the oval language ,
coverpages.org/VulnXMLVisionDocument.pdf. [25] ´ Evolution des malwares Android au cours des derniers mois. https://blog.commtouch.com, 2013. ,
The Technical Specification for the Security Content Automation Protocol (SCAP) http://csrc.nist.gov/publications, pp.800-126, 2009. ,
Supporting Vulnerability Awareness In Autonomic Networks and Systems with OVAL, Proceedings of the seventh International Conference on Network and Service Management, pp.1-8, 2011. ,
Vulnerability Management and Past Experience in Autonomic Networks and Services, 2012. ,
Towards machine-assisted formal procedures for the collection of digital evidence, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.32-35, 2011. ,
DOI : 10.1109/PST.2011.5971960
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework, Proceedings of the IEEE 5th Symposium on Security Analytics and Automation, 2012. ,
DOI : 10.1007/978-3-319-01433-3_3
A probabilistic cost-efficient approach for mobile security assessment, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), 2013. ,
DOI : 10.1109/CNSM.2013.6727842
On Mobile Viruses Exploiting Messaging and Bluetooth Services, 2006 Securecomm and Workshops, pp.1-10, 2006. ,
DOI : 10.1109/SECCOMW.2006.359562
Configuration Fuzzing for Software Vulnerability Detection, 2010 International Conference on Availability, Reliability and Security, pp.525-530, 2010. ,
DOI : 10.1109/ARES.2010.22
Enemy of the State : A State-Aware Black- Box Vulnerability Scanner, Proceedings of the USENIX Security Symposium (USENIX), 2012. ,
Understanding Android Security. Security Privacy, IEEE, vol.7, issue.1, pp.50-57, 2009. ,
DOI : 10.1109/msp.2009.26
Exploiting Open Functionality in SMScapable Cellular Networks, Proceedings of the ACM Conference on Computer and Communication Security (CCS), pp.393-404, 2005. ,
MoBots: A new generation of botnets on mobile devices and networks, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp.262-266, 2012. ,
DOI : 10.1109/ISCAIE.2012.6482109
A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.3-14, 2011. ,
DOI : 10.1145/2046614.2046618
A neural network approach to category validation of Android applications, 2013 International Conference on Computing, Networking and Communications (ICNC), pp.740-744, 2013. ,
DOI : 10.1109/ICCNC.2013.6504180
CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations, 2012 IEEE Sixth International Conference on Software Security and Reliability, pp.78-87, 2012. ,
DOI : 10.1109/SERE.2012.20
Analysis of Android Applications' Permissions, 2012 IEEE Sixth International Conference on Software Security and Reliability Companion, pp.45-46, 2012. ,
DOI : 10.1109/SERE-C.2012.44
DoS attacks exploiting signaling in UMTS and IMS, Computer Communications, vol.34, issue.3, pp.226-235, 2011. ,
DOI : 10.1016/j.comcom.2010.02.010
How secure is your smartphone: An analysis of smartphone security mechanisms, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp.76-81, 2012. ,
DOI : 10.1109/CyberSec.2012.6246082
Analysis and Defensive Tools for Social-Engineering Attacks on Computer Systems, 2006 IEEE Information Assurance Workshop, pp.388-389, 2006. ,
DOI : 10.1109/IAW.2006.1652125
Juxtapp and DStruct : Detection of Similarity Among Android Applications, Master's thesis, 2012. ,
Software Vulnerability Discovery Techniques: A Survey, 2012 Fourth International Conference on Multimedia Information Networking and Security, pp.152-156, 2012. ,
DOI : 10.1109/MINES.2012.202
Finding Security Vulnerabilities in Java Applications with Static Analysis, Proceedings of the 14th conference on USENIX Security Symposium SSYM'05, pp.18-18, 2005. ,
Wireless Security. The McGraw-Hill Companies, 2002. ,
Security of Smart Phones, 2006. ,
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones, 2009 International Conference on Availability, Reliability and Security, pp.695-700, 2009. ,
DOI : 10.1109/ARES.2009.46
Rise of the iBots: Owning a telco network, 2010 5th International Conference on Malicious and Unwanted Software, pp.71-80, 2010. ,
DOI : 10.1109/MALWARE.2010.5665790
An IP based Security Threat in Mobile Networks, Proceedings of the 35th International Convention, pp.667-670, 2012. ,
White-box approaches for improved testing and analysis of configurable software systems, 2009 31st International Conference on Software Engineering, Companion Volume, pp.307-310, 2009. ,
DOI : 10.1109/ICSE-COMPANION.2009.5071008
Improving the Capacity, Reliability and Life of Mobile Devices with Cloud Computing, Proceedings of the IST-Africa Conference 2011, pp.1-9, 2011. ,
The readiness of mobile operating systems for cloud computing services, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, pp.49-55, 2012. ,
DOI : 10.1109/ICUMT.2012.6459717
Mulval : A Logic-Based Network Security Analyzer, Proceedings of the 14th USENIX Security Symposium (Usenix 2005), pp.113-128, 2005. ,
Android botnets on the rise: Trends and characteristics, 2012 Information Security for South Africa, pp.1-5, 2012. ,
DOI : 10.1109/ISSA.2012.6320432
A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, pp.446-471, 2013. ,
DOI : 10.1109/SURV.2012.013012.00028
A-GAP: An Adaptive Protocol for Continuous Network Monitoring with Accuracy Objectives, IEEE Transactions on Network and Service Management, vol.4, issue.1, pp.2-12, 2007. ,
DOI : 10.1109/TNSM.2007.030101
The Opportunistic Transmission of Wireless Worms between Mobile Devices. CoRR, abs/0802, 2008. ,
RFID malware: truth vs. myth, IEEE Security & Privacy Magazine, vol.4, issue.4, pp.70-72, 2006. ,
DOI : 10.1109/MSP.2006.102
Open911: Experiences with the Mobile Plus Cloud Paradigm, 2011 IEEE 4th International Conference on Cloud Computing, pp.606-613, 2011. ,
DOI : 10.1109/CLOUD.2011.96
Security Assessment via Penetration Testing : A Network and System Administrator's Approach, Master's thesis, 2012. ,
A Qualitative Analysis of Privilege Escalation, 2006 IEEE International Conference on Information Reuse & Integration, pp.363-368, 2006. ,
DOI : 10.1109/IRI.2006.252441
All Your Droid are Belong to Us : A Survey of Current Android Attacks, Proceedings of the 5th USENIX conference on Offensive technologies (WOOT'11), pp.10-10, 2011. ,
Reputation Based Security Model for Android Applications, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.896-901, 2012. ,
DOI : 10.1109/TrustCom.2012.236
On cellular botnets, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.223-234, 2009. ,
DOI : 10.1145/1653662.1653690
Android Privacy, Proceedings of the International Conference on Machine Learning and Cybernetics, pp.1830-1837, 2012. ,
Android Malware Detection via a Latent Network Behavior Analysis, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.1251-1258, 2012. ,
DOI : 10.1109/TrustCom.2012.91
Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones, 2012 Proceedings IEEE INFOCOM, pp.2716-2720, 2012. ,
DOI : 10.1109/INFCOM.2012.6195685
DroidMat: Android Malware Detection through Manifest and API Calls Tracing, 2012 Seventh Asia Joint Conference on Information Security, pp.62-69, 2012. ,
DOI : 10.1109/AsiaJCIS.2012.18
The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, pp.46-57, 2005. ,
DOI : 10.1145/1062689.1062697
Private cloud delivery model for supplying centralized analytics services, IBM Journal of Research and Development, vol.56, issue.6, pp.1-10 ,
DOI : 10.1147/JRD.2012.2216331
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012. ,
DOI : 10.1109/SP.2012.16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.368.3979
Specification for the Extensible Configuration Checklist Description Format (XCCDF), 2012. ,
DOI : 10.6028/NIST.IR.7275