W. Enck, P. Gilbert, B. Gon-chun, L. P. Cox, J. Jung et al., TaintDroid, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
DOI : 10.1145/2619091

T. Vidas, D. Votipka, and N. Christin, All your droid are belong to us: a survey of current android attacks, Proceedings of the 5th USENIX conference on Offensive technologies, pp.10-10, 2011.

K. Rieck, P. Trinius, C. Willems, and T. Holz, Automatic analysis of malware behavior using machine learning, Journal of Computer Security, vol.19, issue.4, pp.639-668, 2011.
DOI : 10.3233/JCS-2010-0410

K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov, Learning and Classification of Malware Behavior, Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA '08, pp.108-125, 2008.
DOI : 10.1007/978-3-540-70542-0_6

U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, Scalable, behavior-based malware clustering, Proceedings of the 16th Annual Network and Distributed System Security Symposium, 2009.

A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda, AccessMiner, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866353

X. Jiang, Security alert: New sophisticated android malware droidkungfu found in alternative chinese app markets http

R. Andriatsimandefitra, V. Viet-triem-tong, and L. Mé, Diagnosing intrusions in android operating system using system flow graph, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00875211

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012.
DOI : 10.1109/SP.2012.16

H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, Panorama, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315261

L. K. Yan and H. Yin, Droidscope: Seamlessly reconstructing os and dalvik semantic views for dynamic android malware analysis, Proceedings of the 21st USENIX Security Symposium, 2012.

V. Viet-triem-tong, A. Clark, and L. Mé, Specifying and enforcing a fine-grained information flow policy: Model and experiments, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00516672

M. Rogers, The bearer of badnews https://blog.lookout.com/blogthe-bearer-of-badnews-malware-google-play, 2013.

X. Jiang, Security alert: New droidkungfu variants found in alternative chinese android markets http

T. Strazzere, security alert: Malware found targeting custom roms (jsmshider) https://blog.lookout.com/blog, 2011.