G. Plt, the key to code sharing and dynamic libraries. https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-anddynamic-libraries

M. Backes, S. Gerling, and C. Hammer, AppGuard ??? Enforcing User Requirements on Android Apps, Proceedings of Tools and Algorithms for the Construction and Analysis of Systems, pp.543-548
DOI : 10.1007/978-3-642-36742-7_39

M. Backes, S. Bugiel, and C. Hammer, Boxify: Full-fledged app sandboxing for stock Android, Proceedings of 24th USENIX Security Symposium (USENIX Security 15), 2015.

S. Bugiel, S. Heuser, and A. R. Sadeghi, Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies, Proceedings of 22th USENIX Security Symposium (USENIX Security 13), pp.131-146

M. Conti, V. T. Nguyen, and B. Crispo, CRePE: Context-Related Policy Enforcement for Android, Proceedings of Information Security, pp.331-345, 2011.
DOI : 10.1007/978-3-642-18178-8_29

B. Davis, B. Sanders, and A. Khodaverdian, I-arm-droid: A rewriting framework for in-app reference monitors for android applications, Proceedings of Mobile Security Technologies, 2012.

W. Enck, P. Gilbert, and S. Han, TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, pp.32-37, 2014.
DOI : 10.1145/2619091

P. Hornyack, S. Han, and J. Jung, These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.639-652, 2011.
DOI : 10.1145/2046707.2046780

J. Jeon, K. K. Micinski, and J. A. Vaughan, Hide: finegrained permissions in android applications, Proceedings of the 2nd ACM workshop on Security and privacy in smartphones and mobile devices, pp.3-14

M. Nauman, S. Khan, and X. Zhang, Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010.
DOI : 10.1145/1755688.1755732

S. Rasthofer, S. Arzt, and E. Lovat, DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android, 2014 Ninth International Conference on Availability, Reliability and Security, pp.40-49
DOI : 10.1109/ARES.2014.13

G. Russello, A. B. Jimenez, and H. Naderi, FireDroid, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, pp.319-328
DOI : 10.1145/2523649.2523678

S. Shekhar, M. Dietz, and D. S. Wallach, AdSplit: Separating Smartphone Advertising from Applications, Proceedings of 21th USENIX Security Symposium, pp.553-567

J. Siefers, G. Tan, and G. Morrisett, Robusta:Taming the native beast of the JVM, Proceedings of the 17th ACM conference on Computer and communications security, pp.201-211, 2010.

M. Sun and G. Tan, NativeGuard, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, pp.165-176
DOI : 10.1145/2627393.2627396

X. Wang, K. Sun, and Y. Wang, DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices The Internet Society, Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS'15, 2015.

R. Xu, H. Sadi, and R. Anderson, Aurasium: Practical Policy Enforcement for Android Applications, Proceedings of 21th USENIX Security Symposium, pp.539-552

X. Zhang, A. Ahlawat, and W. Du, AFrame, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, pp.9-18
DOI : 10.1145/2523649.2523652

Y. Zhang, M. Yang, and B. Xu, Vetting undesirable behaviors in android apps with permission use analysis, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp.611-622

Z. Zhao and F. C. Osono, “TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking, 2012 7th International Conference on Malicious and Unwanted Software, p.135143, 2012.
DOI : 10.1109/MALWARE.2012.6461017

Y. Zhou, K. Patel, and L. Wu, Hybrid User-level Sandboxing of Third-party Android Apps, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15
DOI : 10.1145/2714576.2714598

Y. Zhou, X. Zhang, and X. Jiang, Taming Information-Stealing Smartphone Applications (on Android), Proceedings of the 4th International Conference On Trust and Trustworthy Computing, pp.93-107, 2011.
DOI : 10.1007/978-3-642-21599-5_7