M. Backes, S. Gerling, C. Hammer, M. Maffei, and P. Von-styp-rekowsky, App- Guard -Real-time policy enforcement for third-party applications, 2012.

S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A. R. Sadeghi, XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, 2011.

P. P. Chan, L. C. Hui, and S. M. Yiu, DroidChecker, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pp.125-136, 2012.
DOI : 10.1145/2185448.2185466

E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011.
DOI : 10.1145/1999995.2000018

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.2624

M. Conti, V. T. Nguyen, and B. Crispo, CRePE: Context-Related Policy Enforcement for Android, Proceedings of the 13th international conference on Information security, pp.331-345, 2011.
DOI : 10.1007/978-3-642-18178-8_29

B. Davis, B. Sanders, A. Khodaverdian, and H. Chen, I-arm-droid: A rewriting framework for in-app reference monitors for android applications

M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach, QUIRE: Lightweight Provenance for Smart Phone Operating Systems, p.2445, 2011.

W. Enck, M. Ongtang, and P. Mcdaniel, On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.235-245, 2009.
DOI : 10.1145/1653662.1653691

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.170.4433

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011.
DOI : 10.1145/2046707.2046779

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160

A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, Permission redelegation: attacks and defenses, Proceedings of the 20th USENIX conference on Security, pp.22-22, 2011.

C. Gibler, J. Crussell, J. Erickson, and H. Chen, AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Proceedings of the 5th international conference on Trust and Trustworthy Computing, pp.291-307, 2012.
DOI : 10.1007/978-3-642-30921-2_17

M. Grace, Y. Zhou, Z. Wang, and X. Jiang, Systematic Detection of Capability Leaks in Stock Android Smartphones, Proceedings of the 19th Network and Distributed System Security Symposium (NDSS), 2012.

M. C. Grace, W. Zhou, X. Jiang, and A. R. Sadeghi, Unsafe exposure analysis of mobile in-app advertisements, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pp.101-11212, 2012.
DOI : 10.1145/2185448.2185464

P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.639-652, 2011.
DOI : 10.1145/2046707.2046780

I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo, Don't kill my ads!, Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, HotMobile '12, pp.1-2, 2012.
DOI : 10.1145/2162081.2162084

M. Nauman, S. Khan, and X. Zhang, Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010.
DOI : 10.1145/1755688.1755732

M. Ongtang, S. E. Mclaughlin, W. Enck, and P. D. Mcdaniel, Semantically Rich Application-Centric Security in Android, pp.340-349, 2009.

P. Pearce, A. P. Felt, G. Nunez, and D. Wagner, AdDroid, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS '12, 2012.
DOI : 10.1145/2414456.2414498

S. Shekhar, M. Dietz, and D. S. Wallach, AdSplit: separating smartphone advertising from applications, Proceedings of the 21st USENIX conference on Security symposium . pp. 28?28. Security'12, USENIX Association, 2012.

R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen, Investigating user privacy in android ad libraries

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012.
DOI : 10.1109/SP.2012.16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.368.3979