J. Kwon and H. Lee, BinGraph: Discovering mutant malware using hierarchical semantic signatures, 2012 7th International Conference on Malicious and Unwanted Software
DOI : 10.1109/MALWARE.2012.6461015

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012.
DOI : 10.1109/SP.2012.16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. D. Schmidt, R. Bye, H. G. Schmidt, J. Clausen, O. Kiraz et al., Static Analysis of Executables for Collaborative Malware Detection on Android, 2009 IEEE International Conference on Communications, pp.1-5, 2009.
DOI : 10.1109/ICC.2009.5199486

A. Shabtai, Y. Fledel, and Y. Elovici, Automated Static Code Analysis for Classifying Android Applications Using Machine Learning, 2010 International Conference on Computational Intelligence and Security, pp.329-333, 2010.
DOI : 10.1109/CIS.2010.77

I. Burguera, U. Zurutuza, and S. Nadjm-tehrani, Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.15-26, 2011.
DOI : 10.1145/2046614.2046619

J. Lee, K. Jeong, and H. Lee, Detecting metamorphic malwares using code graphs, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, pp.1970-1977, 2010.
DOI : 10.1145/1774088.1774505

W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung et al., TaintDroid, Proc. of the 9th USENIX conference on Operating systems design and implementation (OSDI'10), USENIX Association, pp.1-6, 2010.
DOI : 10.1145/2619091

P. Gilbert, B. G. Chun, L. P. Cox, and J. Jung, Vision, Proceedings of the second international workshop on Mobile cloud computing and services, MCS '11, pp.21-26, 2011.
DOI : 10.1145/1999732.1999740

URL : https://hal.archives-ouvertes.fr/halshs-00370184

T. Blasing, L. Batyuk, A. D. Schmidt, S. Camtepe, and S. Albayrak, An Android Application Sandbox system for suspicious software detection, 2010 5th International Conference on Malicious and Unwanted Software, pp.55-62, 2010.
DOI : 10.1109/MALWARE.2010.5665792

D. Barrera, H. G. Kayacik, P. C. Van-oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.73-84, 2010.
DOI : 10.1145/1866307.1866317

A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev et al., Google Android: A Comprehensive Security Assessment, IEEE Security & Privacy Magazine, vol.8, issue.2, pp.35-44, 2010.
DOI : 10.1109/MSP.2010.2

W. Enck, Defending users against smartphone apps:techniques and future directions, Proc. of the 7th International Conference on Information Systems Security (ICISS'11), pp.49-70, 2011.
DOI : 10.1007/978-3-642-25560-1_3

A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.3-14, 2011.
DOI : 10.1145/2046614.2046618

L. Whitney, Android's popularity makes it open target for malware, says study, CNET, 2011.