H. Be'er, Metaphor: A (Real) Real-Life Stagefright Exploit, Revision 1.1, NorthBit, Herzliya, Israel (raw.githubusercontent, 2016.

R. Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection, 2004.

M. Brand, Stagefrightened? Project Zero, Google, 2015.

J. Drake, Stagefright: Scary code in the heart of Android, presented at the Black Hat USA Conference, 2015.

. G-data-software, Threat Report: Q2, 2015.

Z. Grimmett, J. Staggs, and S. Shenoi, Categorizing mobile device malware based on system side-effects, Advances in Digital Forensics XIII, pp.203-219, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01716405

C. Pfleeger and S. Lawrence-pfleeger, Security in Computing, 2007.

, SWGDE Best Practices for Mobile Phone Forensics, 2013.

H. Sun, K. Sun, Y. Wang, J. Jing, and S. Jajodia, TrustDump: Reliable memory acquisition from smartphones, Proceedings of the Nineteenth European Symposium on Research in Computer Security, part I, pp.202-218, 2014.

J. Sylve, A. Case, L. Marziale, and G. Richard, Acquisition and analysis of volatile memory from Android devices, Digital Investigation, vol.8, pp.175-184, 2012.

V. Thing, K. Ng, and E. Chang, Live memory forensics of mobile phones, Digital Investigation, vol.7, pp.74-82, 2010.

Z. Zlabs, The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes, 2015.