. Burguera, . Iker, . Zurutuza, . Urko, and S. Nadjm-tehrani, Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.15-26, 2011.
DOI : 10.1145/2046614.2046619

L. Yan, . Kwong, and H. Yin, Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis, Proceedings of the 21st USENIX conference on Security symposium, ser. Security'12, pp.29-29, 2012.

M. Grace, . Zhou, . Yajin, . Zhang, . Qiang et al., RiskRanker, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.281-294, 2012.
DOI : 10.1145/2307636.2307663

Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012), 2012.

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011.
DOI : 10.1145/2046707.2046779

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.16

G. Delac, M. Silic, and J. Krolo, Emerging security threats for mobile platforms, 2011.

A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, 2011.
DOI : 10.1145/2046614.2046618

J. Bickford, R. Ohare, A. Baliga, V. Ganapathy, and L. Iftode, Rootkits on smart phones, Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, HotMobile '10, 2010.
DOI : 10.1145/1734583.1734596

URL : https://rucore.libraries.rutgers.edu/rutgers-lib/36725/PDF/1/

L. Batyuk, M. Herpich, S. A. Camtepe, K. Raddatz, A. Schmidt et al., Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications, 2011 6th International Conference on Malicious and Unwanted Software, 2011.
DOI : 10.1109/MALWARE.2011.6112328

. Isohara, . Takamasa, . Takemori, . Keisuke, and A. Kubota, Kernelbased behavior analysis for android malware detection, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security, ser. CIS '11, pp.1011-1015, 2011.

. Zhou, . Wu, . Zhou, . Yajin, . Jiang et al., Detecting repackaged smartphone applications in third-party android marketplaces, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.317-326, 2012.
DOI : 10.1145/2133601.2133640

D. Barrera, H. G. Kayacik, P. C. Van-oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010.
DOI : 10.1145/1866307.1866317