A. , A. Andriatsimandefitra, R. Brunelat, A. Lalande, J. et al., GroddDroid: a Gorilla for Triggering Malicious Behaviors, 10th International Conference on Malicious and Unwanted Software, pp.119-127, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01201743

A. , R. , A. Viet, and V. Tong, Capturing Android Malware Behaviour using System Flow Graph, 8th International Conference on Network and System Security (Xi'an, pp.534-541, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01018611

A. , S. Rasthofer, S. Fritz, C. Bodden, E. Bartel et al., Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps, ACM SIG- PLAN Conference on Programming Language Design and Implementation, pp.259-269, 2014.

E. , W. Gilbert, P. Chun, B. Cox, L. P. Jung et al., TaintDroid: an informationflow tracking system for realtime privacy monitoring on smartphones, 9th USENIX Symposium on Operating Systems Design and Implementation USENIX Association, pp.393-407, 2010.

L. , M. Neugschwandtner, M. Weichsel-baum, L. Fratantonio, Y. Van-der et al., Andrubis -1,000,000 Apps Later: A View on Current Android Malware Behaviors, 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014.

R. Lipovsky, ESET analyzes first android fileencrypting , TOR-enabled ransomware, 2014.

N. and M. Warning, Mobile privacy tools " socialpath " and " save me " are malwarewarning-mobile-privacy-tools- socialpath-and-save-me-are-malware, 2015.

R. , C. Dietrich, C. J. Grier, C. Kreibich, C. Paxson et al., Prudent practices for designing malware experiments: Status quo and outlook, IEEE Symposium on Security and Privacy, pp.65-79, 2012.

Z. , Y. And-jiang, and X. , Dissecting android malware: Characterization and evolution, IEEE Symposium on Security and Privacy, pp.95-109, 2012.