A. Armando, G. Costa, and A. Merlo, Formal modeling and verification of the Android security framework, p.TGC, 2012.

S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A. R. Sadeghi et al., Towards taming privilege-escalation attacks on Android, p.NDSS, 2012.

A. Chaudhuri, Language-based security on Android, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pp.1-7, 2009.
DOI : 10.1145/1554339.1554341

E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011.
DOI : 10.1145/1999995.2000018

L. Davi, A. Dmitrienko, A. R. Sadeghi, and M. Winandy, Privilege Escalation Attacks on Android, pp.346-360, 2010.
DOI : 10.1007/978-3-642-18178-8_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6200

W. Enck, Defending Users against Smartphone Apps: Techniques and Future Directions, pp.49-70, 2011.
DOI : 10.1007/978-3-642-21599-5_7

W. Enck, P. Gilbert, B. Gon-chun, L. P. Cox, J. Jung et al., TaintDroid, ACM Transactions on Computer Systems, vol.32, issue.2, pp.393-407, 2010.
DOI : 10.1145/2619091

W. Enck, D. Octeau, P. Mcdaniel, and S. Chaudhuri, A study of Android application security, USENIX Security Symposium, 2011.

W. Enck, M. Ongtang, and P. D. Mcdaniel, Understanding Android Security, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.50-57, 2009.
DOI : 10.1109/MSP.2009.26

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011.
DOI : 10.1145/2046707.2046779

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3160

A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, Permission redelegation: Attacks and defenses, USENIX Security Symposium, 2011.

E. Fragkaki, L. Bauer, L. Jia, and D. Swasey, Modeling and Enhancing Android???s Permission System, ESORICS. pp, pp.1-18, 2012.
DOI : 10.1007/978-3-642-33167-1_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.258.6424

A. P. Fuchs, A. Chaudhuri, and J. S. Foster, Scandroid: Automated security certification of Android applications, 2009.

E. Gagnon, L. J. Hendren, and G. Marceau, Efficient Inference of Static Types for Java Bytecode, In: SAS. pp, pp.199-219, 2000.
DOI : 10.1007/978-3-540-45099-3_11

G. Inc, Reference documentation for android.app.PendingIntent

A. K. Maji, F. A. Arshad, S. Bagchi, and J. S. Rellermeyer, An empirical study of the robustness of Inter-component Communication in Android, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), p.DSN, 2012.
DOI : 10.1109/DSN.2012.6263963