T. Book and D. S. Wallach, A case of collusion, Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, SPSM '13, 1307.
DOI : 10.1145/2516760.2516762

W. Enck and . Other, TaintDroid, OSDI'10
DOI : 10.1145/2619091

M. Egele and . Other, Pios: Detecting privacy leaks in ios applications, NDSS, 2011.

S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein et al., Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Proceedings of the 35th annual ACM SIGPLAN conference on Programming Language Design and Implementation, p.2014, 2014.

A. P. Fuchs, A. Chaudhuri, and J. S. Foster, Scandroid: Automated security certification of android applications, 2009.

L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, CHEX, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382223

C. Gibler, J. Crussell, J. Erickson, and H. Chen, AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Trust and Trustworthy Computing, 2012.
DOI : 10.1007/978-3-642-30921-2_17

J. Jeon, K. K. Micinski, and J. S. Foster, Symdroid: Symbolic execution for dalvik bytecode, 2012.

J. Kim, Y. Yoon, K. Yi, J. Shin, and S. Center, Scandal: Static analyzer for detecting privacy leaks in android applications

Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning et al., AppIntent, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13
DOI : 10.1145/2508859.2516676

Y. Agarwal and . Other, ProtectMyPrivacy, Proceeding of the 11th annual international conference on Mobile systems, applications, and services, MobiSys '13, 2013.
DOI : 10.1145/2462456.2464460

G. Sarwar and . Other, On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices, 10th International Conference on Security and Cryptography (SECRYPT), 2013.

J. R. Mayer and . Other, Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, p.12, 2012.
DOI : 10.1109/SP.2012.47

F. Roesner and . Other, Detecting and defending against third-party tracking on the web, " ser, p.12

S. Han, A study of third-party tracking by mobile apps in the wild Objective-c runtime environment Trampoline technique, Tech. Rep.Trampoline, vol.20, 2011.

S. Seneviratne, A. Seneviratne, P. Mohapatra, and A. Mahanti, Predicting user traits from a snapshot of apps installed on a smartphone, ACM SIGMOBILE Mobile Computing and Communications Review, vol.18, issue.2, 2014.
DOI : 10.1145/2636242.2636244