D. Barrera, H. G. Kayacik, P. C. Van-oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010.
DOI : 10.1145/1866307.1866317

L. Batyuk, M. Herpich, S. A. Camtepe, K. Raddatz, A. Schmidt et al., Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications, 2011 6th International Conference on Malicious and Unwanted Software, pp.66-72, 2011.
DOI : 10.1109/MALWARE.2011.6112328

J. Bickford, R. O. Hare, A. Baliga, V. Ganapathy, and L. Iftode, Rootkits on smart phones, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile '10, 2010.
DOI : 10.1145/1734583.1734596

. Burguera, . Iker, . Zurutuza, . Urko, and S. Nadjm-tehrani, Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.15-26, 2011.
DOI : 10.1145/2046614.2046619

G. Delac, M. Silic, and J. Krolo, Emerging security threats for mobile platforms, 2011.

A. Porter-felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild. SPSM'11, 2011.

M. Grace, . Zhou, . Yajin, . Zhang, . Qiang et al., RiskRanker, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.281-294, 2012.
DOI : 10.1145/2307636.2307663

. Hamandi, . Khodor, . Elhajj, H. Imad, . Chehab et al., Android SMS botnet, Proceedings of the 10th ACM international symposium on Mobility management and wireless access, MobiWac '12, pp.125-130, 2012.
DOI : 10.1145/2386995.2387016

S. Martin and . Olivier-heloise-pieterse, Android botnets on the rise : Trends and characteristics, ISSA'12, pp.1-5, 2012.

. Isohara, . Takamasa, . Takemori, . Keisuke, and A. Kubota, Kernel-based Behavior Analysis for Android Malware Detection, 2011 Seventh International Conference on Computational Intelligence and Security, pp.1011-1015, 2011.
DOI : 10.1109/CIS.2011.226

K. Amiya, F. A. Maji, S. Arshad, J. S. Bagchi, and . Rellermeyer, An empirical study of the robustness of inter-component communication in android, Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), DSN '12, pp.1-12

S. Moghaddam and A. Helmy, Modeling of internet usage in large mobile societies using self-organizing maps, ACM SIGMOBILE Mobile Computing and Communications Review, vol.14, issue.4, pp.13-15, 2010.
DOI : 10.1145/1942268.1942274

L. Yan, . Kwong, and H. Yin, Droidscope : seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis, Proceedings of the 21st USENIX conference on Security symposium, Security'12, pp.29-29

. Zhou, . Wu, . Zhou, . Yajin, . Jiang et al., Detecting repackaged smartphone applications in third-party android marketplaces, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.317-326, 2012.
DOI : 10.1145/2133601.2133640

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.368.3979

Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, Hey, you, get off of my market : Detecting malicious apps in official and alternative android markets, Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012), 2012.