L. Goasduff and C. Pettey, Gartner says worldwide smartphone sales soared in fourth quarter of 2011 with 47 percent growth, 2012.

L. Goasduff, Gartner says smartphone sales surpassed one billion units in 2014, p.2996817, 2015.

. Ofcom, The Communications Market Report Available: https://www.ofcom.org.uk/__data, 2016.

G. Suarez-tangil, J. E. Tapiador, P. Peris-lopez, and A. Ribagorda, Evolution, Detection and Analysis of Malware for Smart Devices, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.961-987, 2011.
DOI : 10.1109/SURV.2013.101613.00077

K. Lab, Mobile Malware Evolution 2016 Available: https://securelist.com/mobile-malware-evolution, 2016.

R. Unuchek, Rooting Pokémons in Google Play Store Septembre 2016 Available: https://securelist.com/rooting-pokemons-in-google-play-store

, Mobile Malware Evolution 2017 Available: https://securelist.com/mobile-malware-review-2017, 2018.

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.16

K. Tam, A. Feizollah, N. B. Anuar, R. Salleh, and L. Cavallaro, The Evolution of Android Malware and Android Analysis Techniques, ACM Computing Surveys, vol.49, issue.4, pp.761-7641, 2017.
DOI : 10.1145/2133601.2133640

L. Xue, Y. Zhou, T. Chen, X. Luo, and G. Gu, Malton: Towards on-device noninvasive mobile malware analysis for ART, 26th USENIX Security Symposium (USENIX Security 17), 2017.

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046779

K. W. Au, Y. F. Zhou, Z. Huang, and D. Lie, PScout, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382222

Y. Wang, J. Zheng, C. Sun, and S. Mukkamala, Quantitative Security Risk Assessment of Android Permissions and Applications, Proceedings of the 27th Data BIGMOMAL WTMC'18 and Applications Security and Privacy (DBSec), 2013.
DOI : 10.1007/978-3-642-39256-6_15

URL : https://hal.archives-ouvertes.fr/hal-01490707

Y. Zhou, Z. Wang, W. Zhou, and J. Xuxian, Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets, Proceedings of the 19th Network and Distributed System Security Symposium, 2012.

S. Arshad, M. A. Shah, A. Khan, and M. Ahmed, Android Malware Detection & Protection: A Survey, International Journal of Advanced Computer Science and Applications, vol.7, issue.2, 2016.
DOI : 10.14569/IJACSA.2016.070262

URL : http://thesai.org/Downloads/Volume7No2/Paper_62-Android_Malware_Detection_Protection_Survey.pdf

W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung et al., Taint- Droid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, 2010.

M. Dimja?evi?, S. Atzeni, I. Ugrina, and Z. Rakamaric, Evaluation of Android Malware Detection Based on System Calls, Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, IWSPA '16, 2016.
DOI : 10.1145/2523649.2523659

V. Afonso, M. F. , A. R. , G. B. , and P. L. , Identifying Android malware using dynamically obtained features, Journal of Computer Virology and Hacking Techniques, vol.14, issue.1, pp.9-17, 2015.
DOI : 10.1109/SP.2012.16

Y. Mirsky, A. Shabtai, L. Rokach, B. Shapira, and Y. Elovici, SherLock vs Moriarty, Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, ALSec '16, 2016.
DOI : 10.1145/1107548.1107591

D. T. Wagner, A. Rice, and A. R. Beresford, Device analyzer, ACM SIGMETRICS Performance Evaluation Review, vol.41, issue.4, pp.53-56, 2014.
DOI : 10.1145/2627534.2627553

C. Shepard, A. Rahmati, C. Tossell, L. Zhong, and P. Kortum, LiveLab, ACM SIGMETRICS Performance Evaluation Review, vol.38, issue.3, pp.15-20, 2011.
DOI : 10.1145/1925019.1925023

P. Casas, F. Soro, J. Vanerio, G. Settanni, and A. , Network security and anomaly detection with Big-DAMA, a big data analytics framework, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet), pp.1-7, 2017.
DOI : 10.1109/CloudNet.2017.8071525

S. Wassermann, P. Casas, T. Cuvelier, and B. Donnet, NETPerfTrace, Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks , Big-DAMA '17, 2017.
DOI : 10.1109/TNSM.2012.070412.110180

P. Geurts, A. Irrthum, and L. Wehenkel, Supervised learning with decision tree-based methods in computational and systems biology, Molecular BioSystems, vol.64, issue.suppl 1, pp.1593-1605, 2009.
DOI : 10.1093/bioinformatics/btg1058