B. Ips and D. , http://www.myip.ms/browse/blacklist. Last visit in may, 2015.

A. Carroll and G. Heiser, An Analysis of Power Consumption in a Smartphone, Proceedings of 2010 USENIX Annual Technical Conference, 2010.

S. Dai, A. Tongaonkar, X. Wang, A. Nucci, and D. Song, NetworkProfiler: Towards automatic fingerprinting of Android apps, 2013 Proceedings IEEE INFOCOM, pp.809-817, 2013.
DOI : 10.1109/INFCOM.2013.6566868

P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. Gaur et al., Android Security: A Survey of Issues, Malware Penetration, and Defenses, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.1-1, 2015.
DOI : 10.1109/COMST.2014.2386139

S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. , Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags, Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2014, pp.543-546, 2014.

J. Ferrer, F. Chicano, and E. Alba, Estimating software testing complexity, Information and Software Technology, vol.55, issue.12, pp.2125-2139, 2013.
DOI : 10.1016/j.infsof.2013.07.007

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.406.4273

G. Gibb, H. Zeng, and N. Mckeown, Outsourcing network functionality, Proceedings of the first workshop on Hot topics in software defined networks, HotSDN '12, pp.73-78, 2012.
DOI : 10.1145/2342441.2342457

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.6813

A. Gorla, I. Tavecchia, F. Gross, A. Zeller, G. Hurel et al., Checking App Behavior Against App Descriptions Towards Cloud- Based Compositions of Security Functions for Mobile Devices, Proceedings of the 36th International Conference on Software Engineering, ICSE '14 Proceedings of the 14th IFIP/IEEE International Symposium on Integrated Network Management, pp.1025-1035, 2014.

C. Kilinc, T. Booth, and K. Andersson, WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.877-883, 2012.
DOI : 10.1109/TrustCom.2012.298

A. Lahmadi, F. Beck, E. Finickel, and O. Festor, A platform for the analysis and visualization of network flow data of android environments, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.
DOI : 10.1109/INM.2015.7140443

URL : https://hal.archives-ouvertes.fr/hal-01242911

J. Lin, S. Amini, J. Hong, N. Sadeh, J. Lindqvist et al., Expectation and purpose, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.501-510, 2012.
DOI : 10.1145/2370216.2370290

A. Mylonas, A. Kastania, and D. Gritzalis, Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol.34, pp.47-66, 2013.
DOI : 10.1016/j.cose.2012.11.004

J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian, Virtualized in-cloud security services for mobile devices, Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt '08, pp.31-35, 2008.
DOI : 10.1145/1622103.1629656

M. L. Polla, F. Martinelli, and D. Sgandurra, A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, pp.446-471, 2013.
DOI : 10.1109/SURV.2012.013012.00028

Z. A. Qazi, C. Tu, L. Chiang, R. Miao, V. Sekar et al., SIMPLE-fying Middlebox Policy Enforcement using SDN, ACM SIGCOMM 2013 Conference, SIGCOMM'13, pp.27-38, 2013.

A. Sapio, Y. Liao, M. Baldi, G. Ranjan, F. Risso et al., Per-user policy enforcement on mobile apps through network functions virtualization, Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture, MobiArch '14, pp.37-42, 2014.
DOI : 10.1145/2645892.2645896

J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy et al., Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service, ACM SIGCOMM 2012 Conference, SIGCOMM '12, pp.13-24, 2012.

R. Stevens, J. Ganz, V. Filkov, P. T. Devanbu, and H. Chen, Asking for (and about) permissions used by Android apps, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.31-40, 2013.
DOI : 10.1109/MSR.2013.6624000

X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, ProfileDroid, Proceedings of the 18th annual international conference on Mobile computing and networking, Mobicom '12, pp.137-148, 2012.
DOI : 10.1145/2348543.2348563