Y. Agarwal and M. Hall, ProtectMyPrivacy, Proceeding of the 11th annual international conference on Mobile systems, applications, and services, MobiSys '13, 2013.
DOI : 10.1145/2462456.2464460

S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel et al., FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, Proc. of PLDI, 2014.

T. Azim and I. Neamtiu, Targeted and Depth-first Exploration for Systematic Testing of Android Apps, Proc. of OOPSLA, 2013.

R. Balebako, J. Jung, W. Lu, L. F. Cranor, and C. Nguyen, Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones, Proc. of SOUPS, 2013.

J. Bell and G. Kaiser, Phosphor: Illuminating Dynamic Data Flow in Commodity JVMs, Proc. of OOPSLA, 2014.

T. Book and D. S. Wallach, A case of collusion, Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, SPSM '13, 2013.
DOI : 10.1145/2516760.2516762

Y. Cao, Y. Fratantonio, A. Bianchi, M. Egele, C. Kruegel et al., EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23140

X. Chen and S. Zhu, DroidJust, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, 2015.
DOI : 10.1145/2766498.2766507

S. R. Choudhary, A. Gorla, and A. Orso, Automated Test Input Generation for Android: Are We There Yet? (E), 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2015.
DOI : 10.1109/ASE.2015.89

S. Consolvo, J. Jung, B. Greenstein, P. Powledge, G. Maganis et al., The Wi-Fi privacy ticker, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, 2010.
DOI : 10.1145/1864349.1864398

J. Crussell, R. Stevens, and H. Chen, MAdFraud, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, MobiSys '14, pp.123-134, 2014.
DOI : 10.1145/2594368.2594391

M. Egele, C. Kruegel, E. Kirda, and G. Vigna, PiOS: Detecting Privacy Leaks in iOS Applications, Proc. of NDSS, 2011.

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., TaintDroid, Proc. of USENIX OSDI, 2010.
DOI : 10.1145/2619091

C. Gibler, J. Crussell, J. Erickson, and H. Chen, AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Proc. of TRUST, 2012.
DOI : 10.1007/978-3-642-30921-2_17

P. Gill, V. Erramilli, A. Chaintreau, B. Krishnamurthy, D. Papagiannaki et al., Follow the Money: Understanding Economics of Online Aggregation and Advertising Unsafe Exposure Analysis of Mobile In-app Advertisements, Proc. of IMC Proc. of WiSec, 2012.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

S. Han, J. Jung, and D. Wetherall, A Study of Third-Party Tracking by Mobile Apps in the Wild, 2012.

S. Hao, B. Liu, S. Nath, W. G. Halfond, and R. Govindan, PUMA, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, MobiSys '14, 2014.
DOI : 10.1145/2594368.2594390

S. Hao, B. Liu, S. Nath, W. G. Halfond, and R. Govindan, PUMA, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, MobiSys '14, 2014.
DOI : 10.1145/2594368.2594390

R. Herbster, S. Dellatorre, P. Druschel, and B. Bhattacharjee, Privacy Capsules, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '16, 2016.
DOI : 10.1145/2906388.2906409

P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046780

M. Huber, M. Mulazzani, S. Schrittwieser, and E. Weippl, Appinspect, Proceedings of the first ACM conference on Online social networks, COSN '13, 2013.
DOI : 10.1145/2512938.2512942

S. Jagabathula, L. Subramanian, and A. Venkataraman, Reputation-based worker filtering in crowdsourcing, Advances in Neural Information Processing Systems, pp.2492-2500, 2014.

J. Jeon, K. K. Micinski, and J. S. Foster, SymDroid: Symbolic Execution for Dalvik Bytecode, 2012.

C. Johnson and I. , US Office of Management and Budget Memorandum M-07-16, 2007.

J. Kim, Y. Yoon, K. Yi, and J. Shin, SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications, Proc. of MoST, 2012.

H. King, No. 1 paid app on iTunes taken down by developer, 2015.
URL : https://hal.archives-ouvertes.fr/insu-01178180

B. Krishnamurthy and C. Wills, Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526782

A. Le, J. Varmarken, S. Langhoff, A. Shuba, M. Gjoka et al., AntMonitor, Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, C2B(1)D '15, 2015.
DOI : 10.1145/2787394.2787396

I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo, Don't kill my ads! Balancing Privacy in an Ad-Supported Mobile Application Market, Proc. of ACM HotMobile, 2012.

M. Lindorfer, M. Neugschwandtner, L. Weichselbaum, Y. Fratantonio, V. Van-der-veen et al., ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014.
DOI : 10.1109/BADGERS.2014.7

Y. Liu, H. H. Song, I. Bermudez, A. Mislove, M. Baldi et al., Identifying Personal Information in Internet Traffic, Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN '15, 2015.
DOI : 10.1145/2817946.2817947

L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, CHEX, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382223

A. Machiry, R. Tahiliani, and M. Naik, Dynodroid: an input generation system for Android apps, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, p.2013
DOI : 10.1145/2491411.2491450

D. Naylor, K. Schomp, M. Varvello, I. Leontiadis, J. Blackburn et al., Multi-context TLS (mcTLS): Enabling secure in-network functionality in TLS, Proc. of ACM SIGCOMM, 2015.

A. Rao, A. M. Kakhki, A. Razaghpanah, A. Tang, S. Wang et al., Using the Middle to Meddle with Mobile, 2013.

V. Rastogi, Z. Qu, J. Mcclurg, Y. Cao, Y. Chen et al., Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android, Proc. of SecureComm, 2015.
DOI : 10.1145/1945023.1945039

A. Razaghpanah, N. Vallina-rodriguez, S. Sundaresan, C. Kreibich, P. Gill et al., Haystack: In Situ Mobile Traffic Analysis in User Space. arXiv preprint, 2015.

J. Ren, A. Rao, M. Lindorfer, A. Legout, and D. R. Choffnes, ReCon, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '16, 2015.
DOI : 10.1145/2906388.2906392

URL : https://hal.archives-ouvertes.fr/hal-01386899

F. Roesner, T. Kohno, and D. Wetherall, Detecting and Defending Against Third-Party Tracking on the Web, Proc. of USENIX NSDI, 2012.

. Sandvine, https://www.sandvine.com/downloads/ general/global-internet-phenomena/2014/ 1h-2014-global-internet- phenomena-report.pdf, Global Internet Phenomena Report, 2014.

J. Sherry, C. Lan, R. A. Popa, and S. Ratnasamy, BlindBox: Deep packet inspection over encrypted traffic, Proc. of ACM SIGCOMM, 2015.

Y. Song and U. Hengartner, PrivacyGuard, Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '15, 2015.
DOI : 10.1145/2808117.2808120

N. Vallina-rodriguez, J. Shah, A. Finamore, H. Haddadi, Y. Grunenberger et al., Breaking for commercials, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, 2012.
DOI : 10.1145/2398776.2398812

M. Xia, L. Gong, Y. Lyu, Z. Qi, and X. Liu, Effective Real-Time Android Application Auditing, 2015 IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1109/SP.2015.60

L. K. Yan and H. Yin, DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, Proc. of USENIX Security, 2012.

Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning et al., AppIntent, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516676

Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu et al., Vetting undesirable behaviors in Android apps with permission use analysis, Proc. of ACM CCS, 2013.

Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo, and F. Massacci, StaDynA, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, 2015.
DOI : 10.1145/2699026.2699105