G. Feuillade, V. Genet, V. Triem-tong, J. Hiet, and G. , Reachability analysis of term rewriting systems Articles de journaux francophones Spécification et mécanisme de détection de flots d'information illégaux Jaume M, IJICS International Journal of Information and Computer Security. Journal of Automated Reasoning, 2004.

R. Andriatsimandefitra, A. Brunelat, and J. Lalande, Actes de conférences internationales GroddDroid : a Gorilla for Triggering Malicious Behaviors Abraham A

E. Anceaume, G. Guette, and T. Sirvent, Allemagne (2015) Privacy-Preserving Reputation Mechanism : A Usable Solution Handling Negative Ratings Lajoie-Mazenc P, VISSOFT. IEEE Working Conference on Software Visualization

L. Georget, F. Tronel, G. Piolle, V. Viet-triem-tong, M. Jaume et al., International Conference on Network and System Security. Chine (2014) A Privacy Preserving Distributed Reputation Mechanism, IFIPTM. International Conference on Trust Management. Allemagne (2015) Towards a Semantics for System Calls in terms of Information Flow International Conference on Systems. Espagne (2015) ? Capturing Android Malware Behaviour using System Flow Graph Viet Triem Tong V. ICC. International Conference on Communications. Hongrie (2013) Diagnosing intrusions in Android operating system using system flow graph Andriatsimandefitra R., Viet Triem Tong V., Mé L. WISG. Workshop Interdisciplinaire sur la Sécurité Globale. France (2013) ? Information Flow Policies vs Malware. Andriatsimandefitra R., Saliou T., Viet Triem Tong V. IAS. Information assurance and security, 2013.

S. Geller, V. Viet-triem-tong, L. Mé, R. Secureware-andriatsimandefitra, V. Viet-triem-tong et al., Secure states versus Secure executions : From access control to flow control Jaume M Inde (2013) User Defined Control Flow Policy for Web Service Orchestration Computer & Electronics Security Applications Rendez-vous. France(2012) Designing information flow policies for Android's operating system Activités scientifiques, ? BSPL : A Language to Specify and Compose Fine-grained Information Flow Policies ICISS. International Conference on Information Systems Security Viet Triem Tong V. ICC. International Conference on Communications. Canada (2012) Preventing data leakage in service orchestration Demongeot T., Totel E., Viet Triem Tong V., Le Traon Y. IAS. International Conference on Information Assurance and Security, 2011.

. Sarssi, Actes de la Conférence sur la sécurité des Architectures Réseaux et des Systèmes d, Information. France, 2008.

G. Hiet, L. Mé, J. Zimmermann, C. Bidan, and B. Morin, Détection fiable et pertinente de flux d'information illégaux

D. Sabelfeld and . Sands-dans, Ce problème est aujourd'hui étudié en partie dans les langages de programmation, Mantel et Reinhard se sont intéressés dans [MR07] à ce qui pouvait être déclassifié et au devenir de l'information déclassifiée

. Dans, information concernée s'accordent sur une éventuelle déclassification Dans ce travail, il s'agissait de permettre un flux d'information illégal mais éventuellement nécessaire au fonctionnement d'un service web Ce flux pouvait avoir lieu jamais -une fois -toujours selon la volonté de tous les propriétaires de l'information. Ce travail est une première réflexion qui propose essentiellement que la décision de la déclassification soit prise conjointement par les propriétaires de l'information. Il reste encore à réfléchir à la manière de mettre en oeuvre cet accord, surtout lorsque les propriétaires de l'information ne sont pas atteignables , parce qu'ils sont développeurs d'une application par exemple. Il faut aussi s'intéresser au devenir de l'information déclassifiée

. [. Bibliographie, S. Andriatsimandefitra, V. Geller, . Viet-triem, and . Tong, Designing information flow policies for android's operating system, Proceedings of the International Conference on Computer Communications (ICC), 2012. [And] Androguard

[. Andriatsimandefitra, Characterization and detection of android malware based on information flows, 2014.
URL : https://hal.archives-ouvertes.fr/tel-01127434

[. Andriatsimandefitra, T. Saliou, and V. Tong, Information flow policies vs malware, 2013 9th International Conference on Information Assurance and Security (IAS), 2013.
DOI : 10.1109/ISIAS.2013.6947747

URL : https://hal.archives-ouvertes.fr/hal-00862468

R. Avtt14a, V. Andriatsimandefitra, and . Tong, Capturing Android Malware Behaviour using System Flow Graph, NSS 2014 -The 8th International Conference on Network and System Security, 2014.

R. Avtt14b, V. Andriatsimandefitra, and . Tong, Information Flow Policies vs Malware ? Final Battle ?, Journal of Information Assurance and Security, vol.9, issue.2, pp.72-82, 2014.

R. Avtt14c, V. Andriatsimandefitra, and . Tong, Poster Abstract : Highlighting Easily How Malicious Applications Corrupt Android Devices, Research in Attacks, Intrusions, and Defenses, 2014.

[. Andriatsimandefitra, V. Viet-triem, L. Tong, and . Mé, Diagnosing intrusions in android operating system using system flow graph, Workshop Interdisciplinaire sur la Sécurité Globale, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00875211

L. [. Bell and . Lapadula, Secure computer systems : Mathematical foundations. MTR-2547 (ESD-TR-73-278-I), MITRE Corp, vol.1, 1973.

[. Chong, K. Vikram, and A. C. Myers, Sif : Enforcing confidentiality and integrity in web applications, 16th USENIX Security Symp, 2007.

E. Dorothy, P. J. Denning, and . Denning, Certification of programs for secure information flow, Communications of the ACM, vol.20, issue.7, pp.504-513, 1977.

[. Denning, On the derivation of lattice structured information flow policies, 1976.

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

A. Desnos and G. Gueguen, Android : From reversing to decompilation, 2011.

[. Demongeot, E. Totel, V. Viet-triem, Y. L. Tong, and . Traon, Preventing data leakage in service orchestration, 2011 7th International Conference on Information Assurance and Security (IAS), 2011.
DOI : 10.1109/ISIAS.2011.6122806

URL : https://hal.archives-ouvertes.fr/hal-00657796

W. Enck, P. Gilbert, L. P. Byung-gon-chun, J. Cox, P. Jung et al., TaintDroid, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
DOI : 10.1145/2619091

P. Efstathopoulos, M. Krohn, S. Vandebogart, C. Frey, D. Ziegler et al., Labels and event processes in the asbestos operating system, Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, SOSP '05, pp.17-30, 2005.

[. Geller and C. Hauser, Frédéric Tronel, and Valérie Viet Triem Tong Information flow control for intrusion detection derived from mac policy, Proceedings of the International Conference on Computer Communications (ICC), 2011.

[. George, V. Viet-triem, L. Tong, and . Mé, Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy, 2009.
DOI : 10.1007/978-3-642-04342-0_22

URL : https://hal.archives-ouvertes.fr/hal-00420117

V. [. Geller, . Viet-triem, L. Tong, and . Mé, Bspl : a language to specify and compose fine-grained information flow policies, Proceedings of the The Seventh International Conference on Emerging Security Information , Systems and Technologies (SECURWARE), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00909400

C. Hauser, A basis for intrusion detection in distributed systems using kernel-level data tainting, Theses, Supélec ; QUEENSLAND UNIVERSITY OF TECHNOLOGY, 2013.
URL : https://hal.archives-ouvertes.fr/tel-01066750

L. [. Hiet, B. Mé, V. Morin, . Viet-triem, and . Tong, Monitoring both os and program level information flows to detect intrusions against network servers, IEEE Workshop on "Monitoring, Attack Detection and Mitigation, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00268408

F. [. Hauser, . Tronel, C. Reid, and . Fidge, A taint marking approach to confidentiality violation detection, 10th Australasian Information Security Conference, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736045

V. Mathieu-jaume, . Viet-triem, G. Tong, and . Hiet, Spécification et mécanisme de détection de flots d'information illégaux, Technique et Science Informatiques (TSI), issue.6, pp.31713-742, 2012.

V. Mathieu-jaume, . Viet-triem, L. Tong, and . Mé, Contrôle d'accès versus Contrôle de flots, 10emes Journées Francophones sur les Approches Formelles dans l'Assistance au développement des logiciels, pp.27-41, 2010.

V. Mathieu-jaume, . Viet-triem, L. Tong, and . Mé, Flow based interpretation of access control : Detection of illegal information flows, 7th International Conference on Information Systems Security (ICISS), pp.72-86, 2011.

T. Samuel, P. M. King, and . Chen, Backtracking intrusions, Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.223-236, 2003.

A. Maxwell-krohn, M. Yip, N. Brodsky, M. F. Cliffer, E. Kaashoek et al., Information flow control for standard os abstractions, Proceedings of the 21st Symposium on Operating Systems Principles, 2007.

A. Maxwell-krohn, M. Yip, N. Brodsky, M. F. Cliffer, E. Kaashoek et al., Information flow control for standard os abstractions, Proceedings of Twenty-first ACM SI- GOPS Symposium on Operating Systems Principles, SOSP '07, pp.321-334, 2007.

[. Lee, M. Park, and S. Cho, Detection and prevention of lena malware on android, Journal of Internet Services and Information Security (JISIS), vol.3, issue.34, pp.63-71, 2013.

C. Andrew, B. Myers, and . Liskov, A decentralized model for information flow control, SIGOPS Oper. Syst. Rev, vol.31, issue.5, pp.129-142, 1997.

H. Mantel and A. Reinhard, Controlling the What and Where of Declassification in Language-Based Security, Proceedings of the 16th European Conference on Programming, ESOP'07, pp.141-156, 2007.
DOI : 10.1007/978-3-540-71316-6_11

C. Andrew and . Myers, Jflow : Practical mostly-static information flow control, Proceedings of the 26th ACM on Principles of Programming Languages, 1999.

C. Andrew and . Myers, Jflow : practical mostly-static information flow control, 26th ACM Symp. on Principles of Programming Languages (POPL), pp.228-241, 1999.

[. Pottier and V. Simonet, Information flow inference for ml, ACM Trans. Program. Lang. Syst, 2003.

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

A. Sabelfeld and D. Sands, Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009.
DOI : 10.3233/JCS-2009-0352

[. Tong, A. Clark, and L. Mé, Specifying and enforcing a fine-grained information flow policy : Model and experiments, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00516672

[. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazières, Making information flow explicit in HiStar, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2006.
DOI : 10.1145/2018396.2018419

[. Zeldovich, S. Boyd-wickizer, E. Kohler, and D. Mazières, Making information flow explicit in HiStar, Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, pp.19-19, 2006.
DOI : 10.1145/2018396.2018419

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109
DOI : 10.1109/SP.2012.16