Y. Aafer, W. Du, and H. Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android, pp.86-103, 2013.
DOI : 10.1007/978-3-642-28166-2_11

K. Allix, Q. Jerome, T. F. Bissyande, J. Klein, R. State et al., A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected?, 2014 IEEE 38th Annual Computer Software and Applications Conference, pp.384-393, 2014.
DOI : 10.1109/COMPSAC.2014.61

D. Amalfitano, A. R. Fasolino, P. Tramontana, S. De-carmine, and A. M. Memon, Using GUI ripping for automated testing of Android applications, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pp.258-261, 2012.
DOI : 10.1145/2351676.2351717

A. Apvrille, The evolution of mobile malware, Computer Fraud & Security, vol.2014, issue.8, pp.201418-201438, 2014.
DOI : 10.1016/S1361-3723(14)70524-X

S. Arzt, S. Rasthofer, and E. Bodden, Instrumenting Android and Java Applications as Easy as abc, Fourth International Conference on Runtime Verification, pp.364-381, 2013.
DOI : 10.1007/978-3-642-40787-1_26

S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel et al., Flow- Droid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.259-269, 2014.

T. Azim and I. Neamtiu, Targeted and Depth-first Exploration for Systematic Testing of Android Apps, OOP- SLA'13, 2013.

T. Blasing, L. Batyuk, A. Schmidt, S. A. Camtepe, and S. Albayrak, An Android Application Sandbox system for suspicious software detection, 2010 5th International Conference on Malicious and Unwanted Software, pp.55-62, 2010.
DOI : 10.1109/MALWARE.2010.5665792

. Cheetahmobile, 2014 Half Year Security Report

S. R. Choudhary, A. Gorla, and A. Orso, Automated Test Input Generation for Android: Are We There Yet? (E), 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.2015
DOI : 10.1109/ASE.2015.89

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., TaintDroid, 9th USENIX Symposium on Operating Systems Design and Implementation, pp.393-407, 2010.
DOI : 10.1145/2619091

P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. S. Gaur et al., Android Security: A Survey of Issues, Malware Penetration, and Defenses, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.998-1022, 2015.
DOI : 10.1109/COMST.2014.2386139

A. Gianazza, F. Maggi, A. Fattori, L. Cavallaro, and S. Zanero, PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications, pp.1402-4826, 2014.

M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, RiskRanker, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.281-294, 2012.
DOI : 10.1145/2307636.2307663

M. Lindorfer and M. Neugschwandtner, ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014.
DOI : 10.1109/BADGERS.2014.7

A. Machiry, R. Tahiliani, and M. Naik, Dynodroid: an input generation system for Android apps, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, p.224, 2013.
DOI : 10.1145/2491411.2491450

S. Neuner, V. V. Veen, and M. Lindorfer, Enter Sandbox: Android Sandbox Comparison, 3rd IEEE Mobile Security Technologies Workshop, 2014.

T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis, Rage against the virtual machine, Proceedings of the Seventh European Workshop on System Security, EuroSec '14, pp.1-6, 2014.
DOI : 10.1145/2592791.2592796

S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, and G. Vigna, Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications, Proceedings 2014 Network and Distributed System Security Symposium, pp.23-26, 2014.
DOI : 10.14722/ndss.2014.23328

V. Rastogi, Y. Chen, and X. Jiang, Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks, IEEE Transactions on Information Forensics and Security, vol.9, issue.1, pp.99-108, 2014.
DOI : 10.1109/TIFS.2013.2290431

R. Stevens, J. Ganz, V. Filkov, P. Devanbu, and H. Chen, Asking for (and about) permissions used by Android apps, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.31-40, 2013.
DOI : 10.1109/MSR.2013.6624000

T. Vidas and N. Christin, Evading android runtime analysis via sandbox detection, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.447-458, 2014.
DOI : 10.1145/2590296.2590325

C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong et al., SmartDroid, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.93-104, 2012.
DOI : 10.1145/2381934.2381950

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012.
DOI : 10.1109/SP.2012.16