the key to code sharing and dynamic libraries. https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-anddynamic-libraries ,
AppGuard ??? Enforcing User Requirements on Android Apps, Proceedings of Tools and Algorithms for the Construction and Analysis of Systems, pp.543-548 ,
DOI : 10.1007/978-3-642-36742-7_39
Boxify: Full-fledged app sandboxing for stock Android, Proceedings of 24th USENIX Security Symposium (USENIX Security 15), 2015. ,
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies, Proceedings of 22th USENIX Security Symposium (USENIX Security 13), pp.131-146 ,
CRePE: Context-Related Policy Enforcement for Android, Proceedings of Information Security, pp.331-345, 2011. ,
DOI : 10.1007/978-3-642-18178-8_29
I-arm-droid: A rewriting framework for in-app reference monitors for android applications, Proceedings of Mobile Security Technologies, 2012. ,
TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, pp.32-37, 2014. ,
DOI : 10.1145/2619091
These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.639-652, 2011. ,
DOI : 10.1145/2046707.2046780
Hide: finegrained permissions in android applications, Proceedings of the 2nd ACM workshop on Security and privacy in smartphones and mobile devices, pp.3-14 ,
Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010. ,
DOI : 10.1145/1755688.1755732
DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android, 2014 Ninth International Conference on Availability, Reliability and Security, pp.40-49 ,
DOI : 10.1109/ARES.2014.13
FireDroid, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, pp.319-328 ,
DOI : 10.1145/2523649.2523678
AdSplit: Separating Smartphone Advertising from Applications, Proceedings of 21th USENIX Security Symposium, pp.553-567 ,
Robusta:Taming the native beast of the JVM, Proceedings of the 17th ACM conference on Computer and communications security, pp.201-211, 2010. ,
NativeGuard, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, pp.165-176 ,
DOI : 10.1145/2627393.2627396
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices The Internet Society, Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS'15, 2015. ,
Aurasium: Practical Policy Enforcement for Android Applications, Proceedings of 21th USENIX Security Symposium, pp.539-552 ,
AFrame, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, pp.9-18 ,
DOI : 10.1145/2523649.2523652
Vetting undesirable behaviors in android apps with permission use analysis, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp.611-622 ,
“TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking, 2012 7th International Conference on Malicious and Unwanted Software, p.135143, 2012. ,
DOI : 10.1109/MALWARE.2012.6461017
Hybrid User-level Sandboxing of Third-party Android Apps, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15 ,
DOI : 10.1145/2714576.2714598
Taming Information-Stealing Smartphone Applications (on Android), Proceedings of the 4th International Conference On Trust and Trustworthy Computing, pp.93-107, 2011. ,
DOI : 10.1007/978-3-642-21599-5_7