ProtectMyPrivacy, Proceeding of the 11th annual international conference on Mobile systems, applications, and services, MobiSys '13, pp.97-110, 2013. ,
DOI : 10.1145/2462456.2464460
Open platforms, Programming Support Innovations for Emerging Distributed Applications on, PSI EtA '10, pp.1-3, 2010. ,
DOI : 10.1145/1940747.1940750
URL : https://hal.archives-ouvertes.fr/inria-00533721
Automatically securing permission-based software by reducing the attack surface: an application to Android, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012, pp.274-277, 2012. ,
DOI : 10.1145/2351676.2351722
URL : https://hal.archives-ouvertes.fr/hal-00700074
Principles of the Spin Model Checker, 2008. ,
Multiple Instances of the Global Linux Namespaces, Proceedings of the Linux Symposium, pp.101-112, 2006. ,
Diasim: a simulator for pervasive computing applications. Software: Practice and Experience, pp.885-909, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00715745
Encoding Ownership Types in Java, Objects, Models, Components, Patterns, pp.271-290, 2010. ,
DOI : 10.1007/978-3-642-13953-6_15
Leveraging software architectures to guide and verify the development of Sense, Proceedings of the 33rd International Conference on Software Engineering, pp.431-440, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00537789
Toward a Tool-Based Development Methodology for Pervasive Computing Applications, IEEE Transactions on Software Engineering, vol.38, issue.6, pp.1445-1463, 2012. ,
DOI : 10.1109/TSE.2011.107
Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011. ,
DOI : 10.1145/1999995.2000018
A lightweight approach to component-level exception mechanism for robust android apps, Computer Languages, Systems & Structures, vol.44, pp.283-298, 2015. ,
DOI : 10.1016/j.cl.2015.08.010
Programming with QT: Writing portable GUI applications on Unix and Win32, 2010. ,
Perceived needs for assistive technologies in older adults and their caregivers, womENcourage 2015, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01168399
Introspective pushdown analysis of higher-order programs, Proceedings of the 17th ACM SIGPLAN International Conference on Functional Programming, pp.177-188 ,
Profiling user-trigger dependence for Android malware detection, Computers & Security, vol.49, pp.255-273, 2015. ,
A static assurance analysis of Android applications, 2013. ,
Development of dependable applications: a design-driven approach, 2013. ,
URL : https://hal.archives-ouvertes.fr/tel-00829477
TaintDroid, Communications of the ACM, vol.57, issue.3, pp.99-106, 2014. ,
DOI : 10.1145/2494522
Object-oriented application frameworks, Communications of the ACM, vol.40, issue.10, pp.32-38, 1997. ,
DOI : 10.1145/262793.262798
How to Do Everything: Facebook Applications, 2008. ,
Submodules in Racket: You want it when, again?, Proceedings of the 12th International Conference on Generative Programming: Concepts & Experiences, GPCE '13, pp.13-22, 2013. ,
Domain-specific languages. Pearson Education, 2010. ,
Highly precise taint analysis for Android applications, EC SPRIDE, 2013. ,
A step-wise approach for integrating QoS throughout software development process, 2014. ,
Android- Leaks: Detecting privacy leaks in Android applications, 2011. ,
KeyKOS architecture, ACM SIGOPS Operating Systems Review, vol.19, issue.4, pp.8-25, 1985. ,
DOI : 10.1145/858336.858337
TouchDevelop: Programming on the Go. The Expert's Voice. Apress, 2013. ,
Practical and effective sandboxing for non-root users, USENIX Annual Technical Conference, pp.139-144 ,
Capability-Based Computer Systems. Butterworth- Heinemann, 1984. ,
Static analysis for inference of explicit information flow, Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, PASTE '08, pp.50-56, 2008. ,
DOI : 10.1145/1512475.1512486
CHEX, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.229-240, 2012. ,
DOI : 10.1145/2382196.2382223
A framework for static detection of privacy leaks in android applications, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1457-1462, 2012. ,
DOI : 10.1145/2245276.2232009
Beginning iPhone Development: Exploring the iPhone SDK. Apress, 2009. ,
DOI : 10.1007/978-1-4842-0199-2
When and how to develop domain-specific languages, ACM Computing Surveys, vol.37, issue.4, pp.316-344, 2005. ,
DOI : 10.1145/1118890.1118892
Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control, 2006. ,
Testing Android apps through symbolic execution. SIG- SOFT Software Engineering Notes, pp.1-5, 2012. ,
A virtual machine based information flow control system for policy enforcement, Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, pp.3-16, 2007. ,
Compiling and verifying SC-SystemJ programs for safety-critical reactive systems, Computer Languages, Systems & Structures, vol.44, pp.251-282, 2015. ,
DOI : 10.1016/j.cl.2015.08.006
The Art of UNIX Programming, chapter 8, 2003. ,
Android Application Development: Programming with the Google SDK, 2009. ,
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975. ,
Towards a verified, general-purpose operating system kernel, Proceedings of the NICTA Formal Methods Workshop on Operating Systems Verification, NICTA, 2004. ,
EROS: A Fast Capability System, Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles, SOSP '99, pp.170-185, 1999. ,
Control-flow Analysis of Higher-order Languages, 1991. ,
Gradual typing for functional languages, Scheme and Functional Programming Workshop, pp.81-92, 2006. ,
Developing Web Applications with Haskell and Yesod, 2012. ,
Notable design patterns for domain-specific languages, Journal of Systems and Software, vol.56, issue.1, pp.91-99, 2001. ,
DOI : 10.1016/S0164-1212(00)00089-3
Investigating user privacy in Android ad libraries, Workshop on Mobile Security Technologies (MoST), 2012. ,
Software architecture, Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium, ESEC/FSE '09, 2009. ,
DOI : 10.1145/1595696.1595754
URL : https://hal.archives-ouvertes.fr/hal-00444077
Advanced macrology and the implementation of Typed Scheme, Proceedings of the 8th Workshop on Scheme and Functional Programming, pp.1-14, 2007. ,
Languages as libraries, ACM SIGPLAN Notices, vol.46, issue.6, pp.132-141, 2011. ,
DOI : 10.1145/1993316.1993514
Domain-specific languages, ACM SIGPLAN Notices, vol.35, issue.6, pp.26-36, 2000. ,
DOI : 10.1145/352029.352035
Capsicum: Practical capabilities for UNIX, Proceedings of the USENIX Security Symposium. USENIX, 2010. ,
Iulian Neamtiu, and Michalis Faloutsos. Permission evolution in the android ecosystem, Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC '12, pp.31-40 ,
User-aware privacy control via extended static information-flow analysis, ASE, pp.80-89, 2012. ,