R. Lipovsky, RESET analyzes first android fileencrypting, TOR-enabled ransomware, 2014.

X. Jiang, Security alert: New sophisticated android malware droidkungfu found in alternative chinese app markets, 2011.

N. Kiss, J. Lalande, M. Leslous, V. Viet-triem, and . Tong, Kharon dataset: Android malware under a microscope, The LASER 1
URL : https://hal.archives-ouvertes.fr/hal-01311917

, fr and resources: http://kharon.gforge.inria.fr 2 Distribution dashboard : https://developer.android.com/about/dashboard This work has received a French government support granted to the COMIN Labs excellence laboratory

, Workshop: Learning from Authoritative Security Experiment Results, pp.1-12, 2016.

Y. Fratantonio, A. Bianchi, W. Robertson, E. Kirda, C. Kruegel et al., TriggerScope: Towards Detecting Logic Bombs in Android Applications, 2016 IEEE Symposium on Security and Privacy (SP), pp.1-33, 2016.
DOI : 10.1109/SP.2016.30

K. Tam, S. Khan, A. Fattori, and L. Cavallaro, CopperDroid: Automatic Reconstruction of Android Malware Behaviors, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23145

A. Abraham, R. Andriatsimandefitra, A. Brunelat, J. F. Lalande, V. Viet-triem et al., GroddDroid: a gorilla for triggering malicious behaviors, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.119-127, 2015.
DOI : 10.1109/MALWARE.2015.7413692

URL : https://hal.archives-ouvertes.fr/hal-01201743

F. Wei, Y. Li, S. Roy, X. Ou, and W. Zhou, Deep Ground Truth Analysis of Current Android Malware, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp.252-276, 2017.
DOI : 10.14722/ndss.2015.23145

Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109
DOI : 10.1109/SP.2012.16

K. Allix, T. F. Bissyandé, J. Klein, and Y. Le-traon, AndroZoo, Proceedings of the 13th International Workshop on Mining Software Repositories, MSR '16, pp.468-471, 2016.
DOI : 10.1109/SP.2012.16

L. Li, Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting, IEEE Transactions on Information Forensics and Security, vol.12, issue.6, pp.1269-1284, 2017.
DOI : 10.1109/TIFS.2017.2656460

Y. Feng, S. Anand, I. Dillig, and A. Aiken, Apposcopy: semantics-based detection of Android malware through static analysis, Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp.576-587, 2014.
DOI : 10.1145/2635868.2635869

Y. Duan, Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation, Proceedings 2018 Network and Distributed System Security Symposium, 2018.
DOI : 10.14722/ndss.2018.23296

M. Zheng, M. Sun, J. C. Lui, and C. Science, DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.163-171, 2013.

T. Vidas and N. Christin, Evading android runtime analysis via sandbox detection, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.447-458, 2014.
DOI : 10.1145/2590296.2590325

M. Y. Wong and D. Lie, IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware, Proceedings 2016 Network and Distributed System Security Symposium, pp.21-24
DOI : 10.14722/ndss.2016.23118

F. Gianazza, A. Maggi, L. Fattori, S. Cavallaro, and . Zanero, PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications, pp.19-2014

M. Y. Wong and D. Lie, IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware, Proceedings 2016 Network and Distributed System Security Symposium, pp.21-24
DOI : 10.14722/ndss.2016.23118

S. Rasthofer, S. Arzt, S. Triller, and M. Pradel, Making Malory Behave Maliciously: Targeted Fuzzing of Android Execution Environments, 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), pp.300-311, 2017.
DOI : 10.1109/ICSE.2017.35

Y. Fratantonio, A. Bianchi, W. Robertson, E. Kirda, C. Kruegel et al., TriggerScope: Towards Detecting Logic Bombs in Android Applications, 2016 IEEE Symposium on Security and Privacy (SP), pp.1-33, 2016.
DOI : 10.1109/SP.2016.30

M. Leslous, V. Viet-triem-tong, J. Lalande, and T. Genet, GPFinder: Tracking the invisible in Android malware, 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), pp.39-46, 2017.
DOI : 10.1109/MALWARE.2017.8323955

URL : https://hal.archives-ouvertes.fr/hal-01584989

R. Andriatsimandefitra, S. Geller, V. Viet-triem, and . Tong, Designing information flow policies for Android's operating system, 2012 IEEE International Conference on Communications (ICC), pp.976-981, 2012.
DOI : 10.1109/ICC.2012.6364161

W. Yang, D. Kong, T. Xie, and C. A. Gunter, Malware Detection in Adversarial Settings, Proceedings of the 33rd Annual Computer Security Applications Conference on , ACSAC 2017, pp.288-302, 2017.
DOI : 10.1109/ICSE.2015.50