A. Abraham, R. Andriatsimandefitra, A. Brunelat, J. Lalande, V. Tong et al., GroddDroid: a gorilla for triggering malicious behaviors, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.119-127, 2015.
DOI : 10.1109/MALWARE.2015.7413692

URL : https://hal.archives-ouvertes.fr/hal-01201743

V. M. Afonso, M. F. De-amorim, A. R. Grégio, G. B. Junquera, and P. L. De-geus, Identifying Android malware using dynamically obtained features, Journal of Computer Virology and Hacking Techniques, 2014.
DOI : 10.1109/AsiaJCIS.2012.18

R. Andriatsimandefitra and V. Viet-triem-tong, Capturing Android Malware Behaviour Using System Flow Graph, The 8th International Conference on Network and System Security, 2014.
DOI : 10.1007/978-3-319-11698-3_43

URL : https://hal.archives-ouvertes.fr/hal-01018611

T. Blasing, L. Batyuk, A. Schmidt, S. A. Camtepe, A. et al., An Android Application Sandbox system for suspicious software detection, 2010 5th International Conference on Malicious and Unwanted Software, pp.55-62, 2010.
DOI : 10.1109/MALWARE.2010.5665792

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., TaintDroid, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pp.393-407, 2010.
DOI : 10.1145/2619091

N. Kiss, J. Lalande, M. Leslous, V. Tong, and V. , Kharon dataset: Android malware under a microscope, The Learning from Authoritative Security Experiment Results workshop, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01311917

Y. Lin, Y. Lai, C. Chen, and H. Tsai, Identifying android malicious repackaged applications by thread-grained system call sequences, Computers & Security, vol.39, pp.340-350, 2013.
DOI : 10.1016/j.cose.2013.08.010

S. Neuner, V. V. Veen, and M. Lindorfer, Enter Sandbox: Android Sandbox Comparison, 3rd IEEE Mobile Security Technologies Workshop, 2014.

A. Schmidt, H. Schmidt, J. Clausen, A. Camtepe, A. et al., Enhancing Security of Linux-based Android Devices, 15th International Linux Kongress, 2008.

A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ???Andromaly???: a behavioral malware detection framework for android devices, Journal of Intelligent Information Systems, vol.3597, issue.4, pp.161-190, 2012.
DOI : 10.1007/s10844-010-0148-x

M. Y. Wong and D. Lie, IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware, Proceedings 2016 Network and Distributed System Security Symposium, pp.21-24, 2016.
DOI : 10.14722/ndss.2016.23118

D. Wu, C. Mao, T. Wei, H. Lee, and K. Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing, 2012 Seventh Asia Joint Conference on Information Security, pp.62-69, 2012.
DOI : 10.1109/AsiaJCIS.2012.18

C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong et al., SmartDroid, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, p.93, 2012.
DOI : 10.1145/2381934.2381950

Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets, NDSS, pp.50-52, 2012.