ProtectMyPrivacy, Proceeding of the 11th annual international conference on Mobile systems, applications, and services, MobiSys '13, 2013. ,
DOI : 10.1145/2462456.2464460
FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, Proc. of PLDI, 2014. ,
Targeted and Depth-first Exploration for Systematic Testing of Android Apps, Proc. of OOPSLA, 2013. ,
Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones, Proc. of SOUPS, 2013. ,
Phosphor: Illuminating Dynamic Data Flow in Commodity JVMs, Proc. of OOPSLA, 2014. ,
A case of collusion, Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, SPSM '13, 2013. ,
DOI : 10.1145/2516760.2516762
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23140
DroidJust, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, 2015. ,
DOI : 10.1145/2766498.2766507
Automated Test Input Generation for Android: Are We There Yet? (E), 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2015. ,
DOI : 10.1109/ASE.2015.89
The Wi-Fi privacy ticker, Proceedings of the 12th ACM international conference on Ubiquitous computing, Ubicomp '10, 2010. ,
DOI : 10.1145/1864349.1864398
MAdFraud, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, MobiSys '14, pp.123-134, 2014. ,
DOI : 10.1145/2594368.2594391
PiOS: Detecting Privacy Leaks in iOS Applications, Proc. of NDSS, 2011. ,
TaintDroid, Proc. of USENIX OSDI, 2010. ,
DOI : 10.1145/2619091
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Proc. of TRUST, 2012. ,
DOI : 10.1007/978-3-642-30921-2_17
Follow the Money: Understanding Economics of Online Aggregation and Advertising Unsafe Exposure Analysis of Mobile In-app Advertisements, Proc. of IMC Proc. of WiSec, 2012. ,
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
A Study of Third-Party Tracking by Mobile Apps in the Wild, 2012. ,
PUMA, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, MobiSys '14, 2014. ,
DOI : 10.1145/2594368.2594390
PUMA, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, MobiSys '14, 2014. ,
DOI : 10.1145/2594368.2594390
Privacy Capsules, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '16, 2016. ,
DOI : 10.1145/2906388.2906409
These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046780
Appinspect, Proceedings of the first ACM conference on Online social networks, COSN '13, 2013. ,
DOI : 10.1145/2512938.2512942
Reputation-based worker filtering in crowdsourcing, Advances in Neural Information Processing Systems, pp.2492-2500, 2014. ,
SymDroid: Symbolic Execution for Dalvik Bytecode, 2012. ,
US Office of Management and Budget Memorandum M-07-16, 2007. ,
SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications, Proc. of MoST, 2012. ,
No. 1 paid app on iTunes taken down by developer, 2015. ,
URL : https://hal.archives-ouvertes.fr/insu-01178180
Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, 2009. ,
DOI : 10.1145/1526709.1526782
AntMonitor, Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, C2B(1)D '15, 2015. ,
DOI : 10.1145/2787394.2787396
Don't kill my ads! Balancing Privacy in an Ad-Supported Mobile Application Market, Proc. of ACM HotMobile, 2012. ,
ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014. ,
DOI : 10.1109/BADGERS.2014.7
Identifying Personal Information in Internet Traffic, Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN '15, 2015. ,
DOI : 10.1145/2817946.2817947
CHEX, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382223
Dynodroid: an input generation system for Android apps, Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2013, p.2013 ,
DOI : 10.1145/2491411.2491450
Multi-context TLS (mcTLS): Enabling secure in-network functionality in TLS, Proc. of ACM SIGCOMM, 2015. ,
Using the Middle to Meddle with Mobile, 2013. ,
Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android, Proc. of SecureComm, 2015. ,
DOI : 10.1145/1945023.1945039
Haystack: In Situ Mobile Traffic Analysis in User Space. arXiv preprint, 2015. ,
ReCon, Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '16, 2015. ,
DOI : 10.1145/2906388.2906392
URL : https://hal.archives-ouvertes.fr/hal-01386899
Detecting and Defending Against Third-Party Tracking on the Web, Proc. of USENIX NSDI, 2012. ,
https://www.sandvine.com/downloads/ general/global-internet-phenomena/2014/ 1h-2014-global-internet- phenomena-report.pdf, Global Internet Phenomena Report, 2014. ,
BlindBox: Deep packet inspection over encrypted traffic, Proc. of ACM SIGCOMM, 2015. ,
PrivacyGuard, Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '15, 2015. ,
DOI : 10.1145/2808117.2808120
Breaking for commercials, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, 2012. ,
DOI : 10.1145/2398776.2398812
Effective Real-Time Android Application Auditing, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.60
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, Proc. of USENIX Security, 2012. ,
AppIntent, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516676
Vetting undesirable behaviors in Android apps with permission use analysis, Proc. of ACM CCS, 2013. ,
StaDynA, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, 2015. ,
DOI : 10.1145/2699026.2699105