A. Abraham, R. Andriatsimandeetra, A. Brunelat, J. Lalande, V. Viet-triem et al., GroddDroid: a gorilla for triggering malicious behaviors, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.119-127, 2015.
DOI : 10.1109/MALWARE.2015.7413692

URL : https://hal.archives-ouvertes.fr/hal-01201743

F. E. Allen, Control Flow Analysis, Symposium on Compiler Optimization, pp.1-19, 1970.

D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar, The software model checker Blast, International Journal on Software Tools for Technology Transfer, vol.2, issue.4, pp.505-525, 2007.
DOI : 10.1007/s10009-007-0044-z

R. Bodík, R. Gupta, and M. L. Sooa, Refining data flow information using infeasible paths, ACM SIGSOFT Software Engineering Notes, vol.22, issue.6, pp.361-377, 1997.
DOI : 10.1145/267896.267921

B. Dutertre and L. De-moura, The Yices SMT solver, 2006.

V. Ganapathy, T. Jaeger, and S. Jha, Automatic placement of authorization hooks in the linux security modules framework, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.330-339, 2005.
DOI : 10.1145/1102120.1102164

L. Georges, V. Viet-triem, L. Tong, and . Mé, Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy, International Symposium on Recent Advances in Intrusion Detection, 2009.
DOI : 10.1007/978-3-642-04342-0_22

J. D. Guttman, A. L. Herzog, J. D. Ramsdell, and C. W. Skorupka, Verifying information flow goals in Security-Enhanced Linux, Journal of Computer Security, vol.13, issue.1, pp.115-134, 2005.
DOI : 10.3233/JCS-2005-13105

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.645.7510

T. Jaeger, A. Edwards, and X. Zhang, Consistency analysis of authorization hook placement in the Linux security modules framework, ACM Transactions on Information and System Security, vol.7, issue.2, pp.175-205, 2004.
DOI : 10.1145/996943.996944

P. Loscocco and S. Smalley, Integrating Flexible Support for Security Policies into the Linux Operating System, FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX '01), 2001.

J. Merrill, GENERIC and GIMPLE: A new tree representation for entire functions, GCC Developers Summit, pp.171-180, 2003.

D. Muthukumaran, T. Jaeger, and V. Ganapathy, Leveraging "choice" to automate authorization hook placement, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, p.145, 2012.
DOI : 10.1145/2382196.2382215

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.9638

D. E. Porter, M. D. Bond, I. Roy, K. S. Mckinley, and E. Witchel, Practical Fine-Grained Information Flow Control Using Laminar, ACM Transactions on Programming Languages and Systems, vol.37, issue.1, pp.1-51, 2014.
DOI : 10.1145/2638548

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar, ACM SIGPLAN Notices, vol.44, issue.6, pp.63-74, 2009.
DOI : 10.1145/1543135.1542484

S. Smalley, Add missing LSM hooks in mq_timed{send,receive} and splice, Email on the Linux Security Modules development mailing list, 2016.

R. Matthew-stallman, Using the GNU Compiler Collection (GCC), 2013.

C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-hartman, Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.17-31, 2002.
DOI : 10.1109/FITS.2003.1264934

L. Kwong, Y. , and H. Yin, DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis, USENIX Conference on Security Symposium (Security'12). USENIX Association, pp.29-29, 2012.

D. Heng-yin, M. Song, C. Egele, E. Kruegel, and . Kirda, Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis, ACM Conference on Computer and Communications Security, pp.116-127, 2007.

X. Zhang, A. Edwards, and T. Jaeger, Using CQUAL for Static Analysis of Authorization Hook Placement, USENIX Security Symposium. USENIX Association, pp.33-48, 2002.