M. Becher, F. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck et al., Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices, 2011 IEEE Symposium on Security and Privacy, p.96111, 2011.
DOI : 10.1109/SP.2011.29

T. Caldwell, Smart security, Network Security, vol.2011, issue.4, p.59, 2011.
DOI : 10.1016/S1353-4858(11)70037-X

M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. Wallach, Quire: lightweight provenance for smart phone operating systems, th USENIX Security Symposium, p.20, 2011.

M. Dlamini, J. Eloff, and M. Eloff, Information security: The moving target, Computers & Security, vol.28, issue.3-4, pp.3-4, 2009.
DOI : 10.1016/j.cose.2008.11.007

URL : http://repository.up.ac.za/bitstream/2263/9272/1/Dlamini_Information%282009%29.pdf

W. Enck, D. Octeau, P. Mcdaniel, and S. Chaudhuri, A study of android application security, Proc. of the 20 th USENIX conference on Security (SEC'11), p.2121, 2011.

G. Hogben and M. Dekker, Smartphones: Information security risks, opportunities and recommendations for users, 2010.

A. P. Felt, K. Greenwood, and D. Wagner, The effectiveness of application permissions, 2 nd USENIX Conference on Web Application Development (WebApps 11), p.7586, 2011.

. Gartner, Market Share: Mobile Communication Devices by Region and Country, 3Q11, 2011.

M. Grace, Y. Zhou, Z. Wang, and X. Jiang, Systematic Detection of Capability Leaks in Stock Android Smartphones, Proc. of the 19th Network and Distributed System Security

I. Iec, Information technology Security techniques -Information security risk management, 2008.

W. Jansen and K. Scarfone, Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology, Special Publication, pp.800-124, 2008.
DOI : 10.6028/nist.sp.800-124

W. Jeon, J. Kim, Y. Lee, and D. Won, A Practical Analysis of Smartphone Security Human Interface and the Management of Information. Interacting with Information, Trust, Privacy and Security in Digital Business, pp.311320-210221, 2011.

A. Mylonas, Smartphone spying tools, 2008.

A. Mylonas, S. Dritsas, B. Tsoumas, and D. Gritzalis, Smartphone Security Evaluation: The Malware Attack Case, International Conference on Security, p.2536, 2011.

C. Nachenberg, A Window Into Mobile Device Security, Symantec Security Response, 2011.

R. Oppliger, Security and Privacy in an Online World, Computer, vol.44, issue.9, p.2122, 2011.
DOI : 10.1109/MC.2011.292

P. Redman, J. Girard, and L. , Magic quadrant for mobile device management software, 2011.

A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev et al., Google Android: A Comprehensive Security Assessment, IEEE Security & Privacy Magazine, vol.8, issue.2, p.3544, 2010.
DOI : 10.1109/MSP.2010.2