Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek et al., You Get Where You're Looking for: The Impact of Information Sources on Code Security, 2016 IEEE Symposium on Security and Privacy (SP), 2016.

C. A. Jose and . Usa, , pp.289-305

E. Alepis and C. Patsakis, Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era, Security, Privacy, and Applied Cryptography Engineering, pp.53-73, 2017.

K. Allix, F. Tegawendé, J. Bissyandé, Y. L. Klein, and . Traon, AndroZoo: Collecting Millions of Android Apps for the Research Community, Proceedings of the 13th International Conference on Mining Software Repositories (MSR '16, pp.468-471, 2016.

V. Avdiienko, K. Kuznetsov, A. Gorla, A. Zeller, and S. Arzt, Mining Apps for Abnormal Usage of Sensitive Data, 37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, vol.1, pp.426-436, 2015.

B. Bonné, I. Sai-teja-peddinti, N. Bilogrevic, and . Taft, Exploring decision making with Android's runtime permission dialogs using in-context surveys, Thirteenth Symposium on Usable Privacy and Security, pp.195-210, 2017.

D. Damopoulos, G. Kambourakis, and S. Gritzalis, From keyloggers to touchloggers: Take the rough with the smooth, Computers & security, vol.32, pp.102-114, 2013.

A. Desnos, , 2011.

A. Porter-felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android Permissions Demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11), pp.627-638, 2011.

A. Porter-felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android Permissions: User Attention, Comprehension, and Behavior, Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12), 2012.

Y. Fratantonio, C. Qian, S. P. Chung, and W. Lee, Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop, 2017 IEEE Symposium on Security and Privacy (SP). 1041-1057, 2017.

A. Gorla, I. Tavecchia, F. Gross, and A. Zeller, Checking app behavior against app descriptions, 36th International Conference on Software Engineering, ICSE '14, pp.1025-1035, 2014.
DOI : 10.1145/2568225.2568276

N. Haderer, R. Rouvoy, and L. Seinturier, Dynamic Deployment of Sensing Experiments in the Wild Using Smartphones, Distributed Applications and Interoperable Systems -13th IFIP WG 6.1 International Conference, DAIS 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, vol.7891, pp.43-56, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00804114

B. Ives, R. Kenneth, H. Walsh, and . Schneider, The domino effect of password reuse, Commun. ACM, vol.47, pp.75-78, 2004.

Y. Jang, C. Song, S. P. Chung, T. Wang, and W. Lee, A11Y Attacks: Exploiting Accessibility in Operating Systems, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14), pp.103-115, 2014.

L. Jeter and S. Mishra, Identifying and quantifying the android device users' security risk exposure, 2013 International Conference on Computing, Networking and Communications (ICNC, pp.11-17, 2013.

J. Jung, S. Han, and D. Wetherall, Short paper: enhancing mobile application permissions with runtime feedback and constraints, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, pp.45-50, 2012.

J. Kraunelis, Y. Chen, Z. Ling, X. Fu, and W. Zhao, On Malware Leveraging the Android Accessibility Framework, pp.512-523, 2014.

I. Umme-ayda-mannan, R. Ahmed, M. Abdullah, D. Almurshed, C. Dig et al., Understanding Code Smells in Android Applications, Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16, pp.225-234, 2016.

M. Naftali and L. Findlater, Accessibility in Context: Understanding the Truly Mobile Experience of Smartphone Users with Motor Impairments, Proceedings of the 16th International ACM SIGACCESS Conference on Computers & Accessibility (ASSETS '14), pp.209-216, 2014.

D. Duc-cuong-nguyen, Y. Wermke, M. Acar, C. Backes, S. Weir et al., A Stitch in Time: Supporting Android Developers in WritingSecure Code, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1065-1077, 2017.

F. Palomba, D. D. Nucci, A. Panichella, A. Zaidman, and A. De-lucia, Lightweight detection of Androidspecific code smells: The aDoctor project, 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), vol.00, pp.487-491, 2017.

R. Pawlak, M. Monperrus, N. Petitprez, C. Noguera, and L. Seinturier, Spoon: A Library for Implementing Analyses and Transformations of Java Source Code. Software: Practice and Experience, vol.46, pp.1155-1179, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01078532

A. Rodrigues, K. Montague, H. Nicolau, and T. Guerreiro, Getting Smartphones to Talkback: Understanding the Smartphone Adoption Process of Blind Users, Proceedings of the 17th International ACM SIGACCESS Conference on Computers & Accessibility (ASSETS '15), pp.23-32, 2015.

E. Stobert and R. Biddle, The password life cycle: user behaviour in managing passwords, Proceedings of the Tenth Symposium on Usable Privacy and Security (SOUPS '14), 2014.

C. Thompson, M. Johnson, S. Egelman, D. Wagner, and J. King, When It's Better to Ask Forgiveness Than Get Permission: Attribution Mechanisms for Smartphone Resources, Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13), 2013.