Y. Aafer, W. Du, and H. Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android, pp.86-103, 2013.
DOI : 10.1145/2133601.2133640

M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis et al., Tensorflow: A system for large-scale machine learning, pp.265-283, 2016.

M. Ahmadi, B. Biggio, S. Arzt, D. Ariu, and G. Giacinto, Detecting Misuse of Google Cloud Messaging in Android Badware, Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM'16, pp.103-112, 2016.
DOI : 10.1145/2435349.2435377

M. Ahmadi, D. Ulyanov, S. Semenov, M. Trofimov, and G. Giacinto, Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY '16, pp.183-194, 2016.
DOI : 10.1007/s11416-008-0082-4

URL : http://arxiv.org/pdf/1511.04317

B. Amos, H. Turner, and J. White, Applying machine learning classifiers to dynamic Android malware detection at scale, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1666-1671, 2013.
DOI : 10.1109/IWCMC.2013.6583806

N. Andronio, S. Zanero, and F. Maggi, HelDroid: Dissecting and Detecting Mobile Ransomware, Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses, pp.382-404, 2015.
DOI : 10.1007/978-3-319-26362-5_18

M. Aresu, D. Ariu, M. Ahmadi, D. Maiorca, and G. Giacinto, Clustering android malware families by http traffic, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.128-135, 2015.
DOI : 10.1109/MALWARE.2015.7413693

D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, Drebin: Effective and Explainable Detection of Android Malware in Your Pocket, Proceedings 2014 Network and Distributed System Security Symposium, p.NDSS, 2014.
DOI : 10.14722/ndss.2014.23247

S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel et al., Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.259-269, 2014.

V. Avdiienko, K. Kuznetsov, A. Gorla, A. Zeller, S. Arzt et al., Mining Apps for Abnormal Usage of Sensitive Data, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, pp.426-436, 2015.
DOI : 10.1109/ICSE.2015.61

L. Breiman, Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001.
DOI : 10.1023/A:1010933404324

I. Burguera, U. Zurutuza, and S. Nadjm-tehrani, Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pp.15-26, 2011.
DOI : 10.1145/2046614.2046619

T. Colthurst, D. Sculley, G. Hendry, and Z. Nado, Tensorforest: Scalable random forests on tensorflow, Machine Learning Systems Workshop at NIPS, 2016.

S. K. Dash, G. Suarez-tangil, S. Khan, K. Tam, M. Ahmadi et al., DroidScribe: Classifying Android Malware Based on Runtime Behavior, 2016 IEEE Security and Privacy Workshops (SPW), pp.252-261, 2016.
DOI : 10.1109/SPW.2016.25

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7527777

M. Fernández-delgado, E. Cernadas, S. Barro, and D. Amorim, Do we need hundreds of classifiers to solve real world classification problems? Fortinet: Android locker malware uses google cloud messaging service, J. Mach. Learn. Res, vol.15, issue.20, pp.3133-3181, 2014.

. Fortinet, Deep analysis of android rootnik malware using advanced anti-debug and anti-hook, pp.5-8, 2017.

N. Islam, S. Das, and Y. Chen, On-Device Mobile Phone Security Exploits Machine Learning, IEEE Pervasive Computing, vol.16, issue.2, pp.92-96, 2017.
DOI : 10.1109/MPRV.2017.26

D. Maiorca, F. Mercaldo, G. Giacinto, A. Visaggio, and F. Martinelli, R-PackDroid, Proceedings of the Symposium on Applied Computing , SAC '17, 2017.
DOI : 10.1109/SP.2012.16

E. Mariconti, L. Onwuzurike, P. Andriotis, E. De-cristofaro, G. Ross et al., MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models, Proceedings 2017 Network and Distributed System Security Symposium, 2017.
DOI : 10.14722/ndss.2017.23353

C. Point, Charger malware calls and raises the risk on google play http://blog.checkpoint.com, Point, C.: Preinstalled malware targeting mobile users, 2017.

C. Point, A whale of a tale: Hummingbad returns, 2017.

A. Sadeghi, H. Bagheri, J. Garcia, and . Malek, A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software, IEEE Transactions on Software Engineering, vol.43, issue.6, pp.1-1, 2016.
DOI : 10.1109/TSE.2016.2615307

G. Suarez-tangil, S. K. Dash, M. Ahmadi, J. Kinder, G. Giacinto et al., DroidSieve, Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY '17, pp.309-32017, 2017.
DOI : 10.1109/SP.2012.16

V. F. Taylor and I. Martinovic, SecuRank, Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM'16, pp.43-52, 2016.
DOI : 10.1145/2508859.2516689

M. Xia, L. Gong, Y. Lyu, Z. Qi, and X. Liu, Effective Real-Time Android Application Auditing, 2015 IEEE Symposium on Security and Privacy, pp.899-914, 2015.
DOI : 10.1109/SP.2015.60

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7163067

C. Yang, Z. Xu, G. Gu, V. Yegneswaran, and P. Porras, DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications, pp.163-182, 2014.
DOI : 10.1007/978-3-319-11203-9_10

M. Zhang, Y. Duan, H. Yin, and Z. Zhao, Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1105-1116, 2014.
DOI : 10.1145/2590296.2590312