. Appbrain, http://www.appbrain.com/stats/number-of-android-apps, 2014.

K. W. Au, Y. F. Zhou, Z. Huang, and D. Lie, PScout, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.217-228, 2012.
DOI : 10.1145/2382196.2382222

D. Barrera, H. G. Kayacik, P. C. Van-oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010.
DOI : 10.1145/1866307.1866317

A. Bartel, J. Klein, Y. Le-traon, and M. Monperrus, Automatically securing permission-based software by reducing the attack surface: an application to Android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pp.274-277, 2012.
DOI : 10.1145/2351676.2351722

URL : https://hal.archives-ouvertes.fr/hal-00700074

D. M. Blei, A. Y. Ng, and M. I. Jordan, Latent dirichlet allocation, J. Mach. Learn. Res, vol.3, pp.993-1022, 2003.

P. H. Chia, Y. Yamamoto, and N. Asokan, Is this app safe?, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.311-320, 2012.
DOI : 10.1145/2187836.2187879

P. Clark and R. Boswell, Rule induction with CN2: Some recent improvements, Machine learningEWSL-91, pp.151-163, 1991.
DOI : 10.1007/BFb0017011

. Crittercism, Mobile experience benchmark, 2014.

F. J. Damerau, A technique for computer detection and correction of spelling errors, Communications of the ACM, vol.7, issue.3, pp.171-176, 1964.
DOI : 10.1145/363958.363994

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011.
DOI : 10.1145/2046707.2046779

M. Frank, B. Dong, A. Felt, and D. Song, Mining Permission Request Patterns from Android and Facebook Applications, 2012 IEEE 12th International Conference on Data Mining, pp.870-875, 2012.
DOI : 10.1109/ICDM.2012.86

B. Fu, J. Lin, L. Li, C. Faloutsos, J. Hong et al., Why people hate your app, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, pp.1276-1284, 2013.
DOI : 10.1145/2487575.2488202

A. Gorla, I. Tavecchia, F. Gross, and A. Zeller, Checking app behavior against app descriptions, Proceedings of the 36th International Conference on Software Engineering, ICSE 2014, p.31, 2014.
DOI : 10.1145/2568225.2568276

E. Ha and D. Wagner, Do Android users write about electric sheep? Examining consumer reviews in Google Play, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.149-157, 2013.
DOI : 10.1109/CCNC.2013.6488439

N. Haderer, R. Rouvoy, and L. Seinturier, Dynamic Deployment of Sensing Experiments in the Wild Using Smartphones, Proceedings of the International Conference on Distributed Applications and Interoperable Systems, DAIS'13, pp.43-56, 2013.
DOI : 10.1007/978-3-642-38541-4_4

URL : https://hal.archives-ouvertes.fr/hal-00804114

C. Iacob and R. Harrison, Retrieving and analyzing mobile apps feature requests from online reviews, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.41-44, 2013.
DOI : 10.1109/MSR.2013.6624001

J. Jeon, K. K. Micinski, J. A. Vaughan, A. Fogel, N. Reddy et al., Dr. Android and Mr. Hide, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.3-14, 2012.
DOI : 10.1145/2381934.2381938

L. Xu, . Techniques, . Tools, U. Analyzing, M. Android-apps et al., API change and fault proneness: A threat to the success of android apps, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, p.477487, 2013.

A. K. Mccallum, MALLET: a machine learning for language toolkit, 2002.

N. Chen, J. Lin, C. H. Steven, X. Hoi, B. Xiao et al., AR-miner: mining informative reviews for developers from mobile app marketplace, Proceedings of the 36th International Conference on Software Engineering, ICSE 2014
DOI : 10.1145/2568225.2568263

R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, WHYPER: Towards automating risk assessment of mobile applications, USENIX Security, 2013.

J. R. Quinlan, C4. 5: programs for machine learning, 1993.

R. Stevens, J. Ganz, V. Filkov, P. Devanbu, and H. Chen, Asking for (and about) permissions used by Android apps, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.31-40, 2013.
DOI : 10.1109/MSR.2013.6624000

A. Strauss and J. Corbin, Grounded theory methodology: An overview, Handbook of Qualitative Research, pp.273-285, 1994.

T. Vidas, N. Christin, and L. Cranor, Curbing android permission creep, Proceedings of the Web 2.0 Security and Privacy 2011 workshop, 2011.

. Visionmobile, Developer economics q3 2014: State of the developer nation, 2014.

X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Permission evolution in the Android ecosystem, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.31-40
DOI : 10.1145/2420950.2420956

W. Xu, F. Zhang, and S. Zhu, Permlyzer: Analyzing permission usage in Android applications, 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp.400-410, 2013.
DOI : 10.1109/ISSRE.2013.6698893