http://www.myip.ms/browse/blacklist. Last visit in may, 2015. ,
An Analysis of Power Consumption in a Smartphone, Proceedings of 2010 USENIX Annual Technical Conference, 2010. ,
NetworkProfiler: Towards automatic fingerprinting of Android apps, 2013 Proceedings IEEE INFOCOM, pp.809-817, 2013. ,
DOI : 10.1109/INFCOM.2013.6566868
Android Security: A Survey of Issues, Malware Penetration, and Defenses, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.1-1, 2015. ,
DOI : 10.1109/COMST.2014.2386139
Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags, Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2014, pp.543-546, 2014. ,
Estimating software testing complexity, Information and Software Technology, vol.55, issue.12, pp.2125-2139, 2013. ,
DOI : 10.1016/j.infsof.2013.07.007
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.406.4273
Outsourcing network functionality, Proceedings of the first workshop on Hot topics in software defined networks, HotSDN '12, pp.73-78, 2012. ,
DOI : 10.1145/2342441.2342457
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.6813
Checking App Behavior Against App Descriptions Towards Cloud- Based Compositions of Security Functions for Mobile Devices, Proceedings of the 36th International Conference on Software Engineering, ICSE '14 Proceedings of the 14th IFIP/IEEE International Symposium on Integrated Network Management, pp.1025-1035, 2014. ,
WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.877-883, 2012. ,
DOI : 10.1109/TrustCom.2012.298
A platform for the analysis and visualization of network flow data of android environments, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015. ,
DOI : 10.1109/INM.2015.7140443
URL : https://hal.archives-ouvertes.fr/hal-01242911
Expectation and purpose, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.501-510, 2012. ,
DOI : 10.1145/2370216.2370290
Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol.34, pp.47-66, 2013. ,
DOI : 10.1016/j.cose.2012.11.004
Virtualized in-cloud security services for mobile devices, Proceedings of the First Workshop on Virtualization in Mobile Computing, MobiVirt '08, pp.31-35, 2008. ,
DOI : 10.1145/1622103.1629656
A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, pp.446-471, 2013. ,
DOI : 10.1109/SURV.2012.013012.00028
SIMPLE-fying Middlebox Policy Enforcement using SDN, ACM SIGCOMM 2013 Conference, SIGCOMM'13, pp.27-38, 2013. ,
Per-user policy enforcement on mobile apps through network functions virtualization, Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture, MobiArch '14, pp.37-42, 2014. ,
DOI : 10.1145/2645892.2645896
Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service, ACM SIGCOMM 2012 Conference, SIGCOMM '12, pp.13-24, 2012. ,
Asking for (and about) permissions used by Android apps, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.31-40, 2013. ,
DOI : 10.1109/MSR.2013.6624000
ProfileDroid, Proceedings of the 18th annual international conference on Mobile computing and networking, Mobicom '12, pp.137-148, 2012. ,
DOI : 10.1145/2348543.2348563