DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android, Security and Privacy in Communication Networks, pp.86-103, 2013. ,
DOI : 10.1145/2133601.2133640
GroddDroid: a gorilla for triggering malicious behaviors, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), 2015. ,
DOI : 10.1109/MALWARE.2015.7413692
URL : https://hal.archives-ouvertes.fr/hal-01201743
Control flow analysis, Proceedings of a Symposium on Compiler Optimization, pp.1-19, 1970. ,
AndroZoo, Proceedings of the 13th International Workshop on Mining Software Repositories, MSR '16, pp.468-471, 2016. ,
DOI : 10.1109/SP.2012.16
Obfuscation in android malware, and how to fight back. https://www.virusbulletin.com/virusbulletin/2014/07/obfus- cation-android-malware-and-how-fight-back, pp.2017-2023, 2014. ,
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, pp.259-269, 2014. ,
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23140
Android Security: A Survey of Issues, Malware Penetration, and Defenses, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.998-1022, 2015. ,
DOI : 10.1109/COMST.2014.2386139
Triggerscope: Towards detecting logic bombs in android applications Android security : 2016 year in review. https://source.android.com/security, IEEE Symposium on Security and Privacy (SP), pp.377-396, 2016. ,
DOI : 10.1109/sp.2016.30
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses [12] IDC. Smartphone os market share, 2016 q2, pp.33-47, 2012. ,
DOI : 10.1007/978-3-642-35362-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.382.4249
Dexteroid: Detecting malicious behaviors in android apps using reverse-engineered life cycle models. Computers and Security Android taint flow analysis for app sets, Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, pp.92-117, 2014. ,
DOI : 10.1016/j.cose.2016.01.008
URL : http://arxiv.org/abs/1506.05217
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting, IEEE Transactions on Information Forensics and Security, vol.12, issue.6, pp.1269-1284, 2017. ,
DOI : 10.1109/TIFS.2017.2656460
Tracking loadtime configuration options, Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, ASE '14, pp.445-456, 2014. ,
DOI : 10.1145/2642937.2643001
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.434.3295
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis, Proceedings of the 22Nd USENIX Conference on Security, SEC'13, pp.543-558, 2013. ,
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications, Proceedings 2014 Network and Distributed System Security Symposium, pp.23-26, 2014. ,
DOI : 10.14722/ndss.2014.23328
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.638.1902
DroidChameleon, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.329-334, 2013. ,
DOI : 10.1145/2484313.2484355
ConDroid: Targeted Dynamic Analysis of Android Applications, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp.571-578, 2015. ,
DOI : 10.1109/AINA.2015.238
CopperDroid: Automatic Reconstruction of Android Malware Behaviors, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23145
Soot -a java bytecode optimization framework, Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON '99, p.13, 1999. ,
Jimple: Simplifying java bytecode for analyses and transformations, 1998. ,
IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware, Proceedings 2016 Network and Distributed System Security Symposium, 2016. ,
DOI : 10.14722/ndss.2016.23118
Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps, IEEE Transactions on Software Engineering, vol.42, issue.11, pp.421054-1076, 2016. ,
DOI : 10.1109/TSE.2016.2547385
SmartDroid, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.93-104, 2012. ,
DOI : 10.1145/2381934.2381950