A. Armando, A. Merlo, M. Migliardi, and L. Verderame, Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures), Proc. of the 27th IFIP International Information Security and Privacy Conference IFIP Advances in Information and Communication Technology, pp.13-24, 2012.
DOI : 10.1007/978-3-642-30436-1_2

A. Armando, A. Merlo, M. Migliardi, and L. Verderame, Breaking and fixing the Android Launching Flow, Computers & Security, vol.39, 2013.
DOI : 10.1016/j.cose.2013.03.009

T. Blasing, L. Batyuk, A. Schmidt, S. Camtepe, and S. Albayrak, An Android Application Sandbox system for suspicious software detection, 2010 5th International Conference on Malicious and Unwanted Software, pp.55-62, 2010.
DOI : 10.1109/MALWARE.2010.5665792

P. Brady, Anatomy and physiology of an android, Google I/O, 2008.

S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A. Sadeghi, Xmandroid: A new android evolution to mitigate privilege escalation attacks, 2011.

I. Burguera, U. Zurutuza, and S. Nadjm-therani, Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, 2011.
DOI : 10.1145/2046614.2046619

E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011.
DOI : 10.1145/1999995.2000018

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.2624

L. Davi, A. Dmitrienko, A. Sadeghi, and M. Winandy, Privilege Escalation Attacks on Android, Information Security, pp.346-360, 2011.
DOI : 10.1007/978-3-642-18178-8_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6200

W. Enck, M. Ongtang, and P. Mcdaniel, Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.50-57, 2009.
DOI : 10.1109/MSP.2009.26

A. P. Fuchs, A. Chaudhuri, and J. S. Foster, Scandroid: Automated security certification of android applications, 2009.

G. Group, Press Release, 2012.

T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin, Attacks on WebView in the Android system, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.343-352, 2011.
DOI : 10.1145/2076732.2076781

M. Nauman, S. Khan, and X. Zhang, Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010.
DOI : 10.1145/1755688.1755732

R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia et al., Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones, Proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS), 2011.

A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev et al., Google Android: A Comprehensive Security Assessment, IEEE Security & Privacy Magazine, vol.8, issue.2, pp.35-44, 2010.
DOI : 10.1109/MSP.2010.2

Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, Taming Information-Stealing Smartphone Applications (on Android), Proceedings of the 4th international conference on Trust and trustworthy computing, pp.93-107, 2011.
DOI : 10.1007/978-3-642-21599-5_7