D. Barrera, H. G. Kayacik, P. C. Van-oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010.
DOI : 10.1145/1866307.1866317

C. Håland, An Application Security Assessment of Popular Free Android Applications, 2013.

C. Xiao and R. Olson, Insecure Internal Storage in Android -Palo Alto Networks BlogPalo Alto Networks Blog, 2014.

W. Enck, M. Ongtang, and P. Mcdaniel, On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653691

S. Fahl, M. Harbach, T. Muders, L. Baumgärtner, B. Freisleben et al., Why eve and mallory love android, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.50-61, 2012.
DOI : 10.1145/2382196.2382205

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011.
DOI : 10.1145/2046707.2046779

A. P. Felt, K. Greenwood, and D. Wagner, The effectiveness of application permissions, Proceedings of the 2Nd USENIX Conference on Web Application Development . pp. 7?7. WebApps'11, USENIX Association, 2011.

X. Forums, [GUIDE] How to extract, create or edit android adb backups ? Android Development and Hacking ? XDA Forums, 2015.

. Google, Google Play (20), https://play.google.com/store, 2014.

J. King, Android Application Security with OWASP Mobile Top 10 2014, 2014.

H. Pieterse and M. Olivier, Android botnets on the rise: Trends and characteristics, 2012 Information Security for South Africa, pp.1-5, 2012.
DOI : 10.1109/ISSA.2012.6320432