Gartner says worldwide smartphone sales soared in fourth quarter of 2011 with 47 percent growth, 2012. ,
Gartner says smartphone sales surpassed one billion units in 2014, p.2996817, 2015. ,
The Communications Market Report Available: https://www.ofcom.org.uk/__data, 2016. ,
Evolution, Detection and Analysis of Malware for Smart Devices, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.961-987, 2011. ,
DOI : 10.1109/SURV.2013.101613.00077
Mobile Malware Evolution 2016 Available: https://securelist.com/mobile-malware-evolution, 2016. ,
Rooting Pokémons in Google Play Store Septembre 2016 Available: https://securelist.com/rooting-pokemons-in-google-play-store ,
, Mobile Malware Evolution 2017 Available: https://securelist.com/mobile-malware-review-2017, 2018.
Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.16
The Evolution of Android Malware and Android Analysis Techniques, ACM Computing Surveys, vol.49, issue.4, pp.761-7641, 2017. ,
DOI : 10.1145/2133601.2133640
Malton: Towards on-device noninvasive mobile malware analysis for ART, 26th USENIX Security Symposium (USENIX Security 17), 2017. ,
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046779
PScout, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382222
Quantitative Security Risk Assessment of Android Permissions and Applications, Proceedings of the 27th Data BIGMOMAL WTMC'18 and Applications Security and Privacy (DBSec), 2013. ,
DOI : 10.1007/978-3-642-39256-6_15
URL : https://hal.archives-ouvertes.fr/hal-01490707
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets, Proceedings of the 19th Network and Distributed System Security Symposium, 2012. ,
Android Malware Detection & Protection: A Survey, International Journal of Advanced Computer Science and Applications, vol.7, issue.2, 2016. ,
DOI : 10.14569/IJACSA.2016.070262
URL : http://thesai.org/Downloads/Volume7No2/Paper_62-Android_Malware_Detection_Protection_Survey.pdf
Taint- Droid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, 2010. ,
Evaluation of Android Malware Detection Based on System Calls, Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, IWSPA '16, 2016. ,
DOI : 10.1145/2523649.2523659
Identifying Android malware using dynamically obtained features, Journal of Computer Virology and Hacking Techniques, vol.14, issue.1, pp.9-17, 2015. ,
DOI : 10.1109/SP.2012.16
SherLock vs Moriarty, Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, ALSec '16, 2016. ,
DOI : 10.1145/1107548.1107591
Device analyzer, ACM SIGMETRICS Performance Evaluation Review, vol.41, issue.4, pp.53-56, 2014. ,
DOI : 10.1145/2627534.2627553
LiveLab, ACM SIGMETRICS Performance Evaluation Review, vol.38, issue.3, pp.15-20, 2011. ,
DOI : 10.1145/1925019.1925023
Network security and anomaly detection with Big-DAMA, a big data analytics framework, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet), pp.1-7, 2017. ,
DOI : 10.1109/CloudNet.2017.8071525
NETPerfTrace, Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks , Big-DAMA '17, 2017. ,
DOI : 10.1109/TNSM.2012.070412.110180
Supervised learning with decision tree-based methods in computational and systems biology, Molecular BioSystems, vol.64, issue.suppl 1, pp.1593-1605, 2009. ,
DOI : 10.1093/bioinformatics/btg1058