Y. Agarwal and M. Hall, ProtectMyPrivacy, Proceeding of the 11th annual international conference on Mobile systems, applications, and services, MobiSys '13, pp.97-110, 2013.
DOI : 10.1145/2462456.2464460

E. Balland and C. Consel, Open platforms, Programming Support Innovations for Emerging Distributed Applications on, PSI EtA '10, pp.1-3, 2010.
DOI : 10.1145/1940747.1940750

URL : https://hal.archives-ouvertes.fr/inria-00533721

A. Bartel, J. Klein, Y. L. Traon, and M. Monperrus, Automatically securing permission-based software by reducing the attack surface: an application to Android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pp.274-277, 2012.
DOI : 10.1145/2351676.2351722

URL : https://hal.archives-ouvertes.fr/hal-00700074

M. Ben-ari, Principles of the Spin Model Checker, 2008.

E. W. Biederman, Multiple Instances of the Global Linux Namespaces, Proceedings of the Linux Symposium, pp.101-112, 2006.

J. Bruneau and C. Consel, Diasim: a simulator for pervasive computing applications. Software: Practice and Experience, pp.885-909, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00715745

N. Cameron and J. Noble, Encoding Ownership Types in Java, Objects, Models, Components, Patterns, pp.271-290, 2010.
DOI : 10.1007/978-3-642-13953-6_15

D. Cassou, E. Balland, C. Consel, and J. Lawall, Leveraging software architectures to guide and verify the development of Sense, Proceedings of the 33rd International Conference on Software Engineering, pp.431-440, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00537789

D. Cassou, J. Bruneau, C. Consel, and E. Balland, Toward a Tool-Based Development Methodology for Pervasive Computing Applications, IEEE Transactions on Software Engineering, vol.38, issue.6, pp.1445-1463, 2012.
DOI : 10.1109/TSE.2011.107

E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011.
DOI : 10.1145/1999995.2000018

K. Choi and B. Chang, A lightweight approach to component-level exception mechanism for robust android apps, Computer Languages, Systems & Structures, vol.44, pp.283-298, 2015.
DOI : 10.1016/j.cl.2015.08.010

M. K. Dalheimer, Programming with QT: Writing portable GUI applications on Unix and Win32, 2010.

L. Dupuy, H. Sauzéon, and C. Consel, Perceived needs for assistive technologies in older adults and their caregivers, womENcourage 2015, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01168399

C. Earl, I. Sergey, M. Might, and D. Van-horn, Introspective pushdown analysis of higher-order programs, Proceedings of the 17th ACM SIGPLAN International Conference on Functional Programming, pp.177-188

O. Karim, X. Elish, . Shudaphne, B. G. Yao, X. Ryder et al., Profiling user-trigger dependence for Android malware detection, Computers & Security, vol.49, pp.255-273, 2015.

O. Karim, D. D. Elish, B. G. Yao, X. Ryder, and . Jiang, A static assurance analysis of Android applications, 2013.

Q. Enard, Development of dependable applications: a design-driven approach, 2013.
URL : https://hal.archives-ouvertes.fr/tel-00829477

W. Enck, P. Gilbert, L. P. Byung-gon-chun, J. Cox, P. Jung et al., TaintDroid, Communications of the ACM, vol.57, issue.3, pp.99-106, 2014.
DOI : 10.1145/2494522

M. Fayad and D. C. Schmidt, Object-oriented application frameworks, Communications of the ACM, vol.40, issue.10, pp.32-38, 1997.
DOI : 10.1145/262793.262798

J. Feiler, How to Do Everything: Facebook Applications, 2008.

M. Flatt, Submodules in Racket: You want it when, again?, Proceedings of the 12th International Conference on Generative Programming: Concepts & Experiences, GPCE '13, pp.13-22, 2013.

M. Fowler, Domain-specific languages. Pearson Education, 2010.

C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel et al., Highly precise taint analysis for Android applications, EC SPRIDE, 2013.

S. Gatti, A step-wise approach for integrating QoS throughout software development process, 2014.

C. Gibler, J. Crussel, J. Erickson, and H. Chen, Android- Leaks: Detecting privacy leaks in Android applications, 2011.

N. Hardy, KeyKOS architecture, ACM SIGOPS Operating Systems Review, vol.19, issue.4, pp.8-25, 1985.
DOI : 10.1145/858336.858337

R. and N. Tillmann, TouchDevelop: Programming on the Go. The Expert's Voice. Apress, 2013.

T. Kim and N. Zeldovich, Practical and effective sandboxing for non-root users, USENIX Annual Technical Conference, pp.139-144

M. Henry and . Levy, Capability-Based Computer Systems. Butterworth- Heinemann, 1984.

Y. Liu and A. Milanova, Static analysis for inference of explicit information flow, Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, PASTE '08, pp.50-56, 2008.
DOI : 10.1145/1512475.1512486

L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, CHEX, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.229-240, 2012.
DOI : 10.1145/2382196.2382223

C. Mann and A. Starostin, A framework for static detection of privacy leaks in android applications, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1457-1462, 2012.
DOI : 10.1145/2245276.2232009

D. Mark and J. Lamarche, Beginning iPhone Development: Exploring the iPhone SDK. Apress, 2009.
DOI : 10.1007/978-1-4842-0199-2

M. Mernik, J. Heering, and A. M. Sloane, When and how to develop domain-specific languages, ACM Computing Surveys, vol.37, issue.4, pp.316-344, 2005.
DOI : 10.1145/1118890.1118892

S. Mark and . Miller, Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, 2006.

N. Mirzaei, S. Malek, C. S. , N. Esfahani, and R. Mahmood, Testing Android apps through symbolic execution. SIG- SOFT Software Engineering Notes, pp.1-5, 2012.

K. Srijith, P. N. Nair, B. Simpson, A. S. Crispo, and . Tanenbaum, A virtual machine based information flow control system for policy enforcement, Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, pp.3-16, 2007.

H. Park, A. Malik, and Z. Salcic, Compiling and verifying SC-SystemJ programs for safety-critical reactive systems, Computer Languages, Systems & Structures, vol.44, pp.251-282, 2015.
DOI : 10.1016/j.cl.2015.08.006

E. S. Raymond, The Art of UNIX Programming, chapter 8, 2003.

R. Rogers, J. Lombardo, Z. Mednieks, and B. Meike, Android Application Development: Programming with the Google SDK, 2009.

H. Jerome, M. D. Saltzer, and . Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975.

J. S. Shapiro, M. S. Doerrie, E. Northup, S. Sridhar, and M. Miller, Towards a verified, general-purpose operating system kernel, Proceedings of the NICTA Formal Methods Workshop on Operating Systems Verification, NICTA, 2004.

J. S. Shapiro, J. M. Smith, and D. J. Farber, EROS: A Fast Capability System, Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, SOSP '99, pp.170-185, 1999.

O. Grigsby and S. , Control-flow Analysis of Higher-order Languages, 1991.

J. G. Siek and W. Taha, Gradual typing for functional languages, Scheme and Functional Programming Workshop, pp.81-92, 2006.

M. Snoyman, Developing Web Applications with Haskell and Yesod, 2012.

D. Spinellis, Notable design patterns for domain-specific languages, Journal of Systems and Software, vol.56, issue.1, pp.91-99, 2001.
DOI : 10.1016/S0164-1212(00)00089-3

R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen, Investigating user privacy in Android ad libraries, Workshop on Mobile Security Technologies (MoST), 2012.

R. N. Taylor, N. Medvidovic, and E. M. Dashofy, Software architecture, Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium, ESEC/FSE '09, 2009.
DOI : 10.1145/1595696.1595754

URL : https://hal.archives-ouvertes.fr/hal-00444077

S. Tobin-hochstadt and M. Flatt, Advanced macrology and the implementation of Typed Scheme, Proceedings of the 8th Workshop on Scheme and Functional Programming, pp.1-14, 2007.

S. Tobin-hochstadt, V. St-amour, R. Culpepper, M. Flatt, and M. Felleisen, Languages as libraries, ACM SIGPLAN Notices, vol.46, issue.6, pp.132-141, 2011.
DOI : 10.1145/1993316.1993514

A. Van-deursen, P. Klint, and J. Visser, Domain-specific languages, ACM SIGPLAN Notices, vol.35, issue.6, pp.26-36, 2000.
DOI : 10.1145/352029.352035

N. M. Robert, J. Watson, B. Anderson, K. Laurie, and . Kennaway, Capsicum: Practical capabilities for UNIX, Proceedings of the USENIX Security Symposium. USENIX, 2010.

X. Wei and L. Gomez, Iulian Neamtiu, and Michalis Faloutsos. Permission evolution in the android ecosystem, Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, pp.31-40

X. Xiao, N. Tillmann, M. Fähndrich, J. De-halleux, and M. Moskal, User-aware privacy control via extended static information-flow analysis, ASE, pp.80-89, 2012.