Y. Acar, M. Backes, S. Fahl, D. Kim, M. L. Mazurek et al., You Get Where You're Looking for: The Impact of Information Sources on Code Security, IEEE Symposium on Security and Privacy, pp.289-305, 2016.

J. Andrus and J. Nieh, Teaching operating systems using android, 43rd ACM technical symposium on Computer Science Education, pp.613-618, 2012.

D. Apostolopoulos and G. Marinakis, Discovering authentication credentials in volatile memory of Android mobile devices, 12th IFIP Conference on e-Business, e-Services, pp.178-185, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01470532

A. Muhammad-rizwan-asghar and . Luxton-reilly, Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities, 49th ACM Technical Symposium on Computer Science EducationSIGCSE '18, pp.179-184, 2018.

J. Campbell and A. Tafliovich, An Experience Report: Using Mobile Development To Teach Software Design, 46th ACM Technical Symposium on Computer Science Education-SIGCSE '15, pp.506-511, 2015.

N. Elenkov, Android Security Internals: An In-Depth Guide to Android's Security Architecture, 2014.

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones, 9th USENIX Symposium on Operating Systems Design and Implementation. USENIX Association, pp.393-407, 2010.

A. Esakia, S. Niu, and D. Scott-mccrickard, Augmenting Undergraduate Computer Science Education With Programmable Smartwatches, 46th ACM Technical Symposium on Computer Science Education-SIGCSE '15, pp.66-71, 2015.

S. Gunasekera, Android Apps Security, 2012.

M. Guo, P. Bhattacharya, M. Yang, K. Qian, and L. Yang, Learning mobile security with android security labware, 44th ACM technical symposium on Computer science education-SIGCSE '15, pp.675-680, 2013.

C. Hilgers, H. Macht, T. Muller, and M. Spreitzenbarth, Post-Mortem Memory Analysis of Cold-Booted Android Devices, Eighth International Conference on IT Security Incident Management & IT Forensics, pp.62-75, 2014.

. David-r-krathwohl, A Revision of Bloom's Taxonomy: An Overview, Theory Into Practice, vol.41, pp.212-218, 2002.

J. Levin, Android Internals: A Confectioner's Cookbook, 2015.

C. Marforio, H. Ritzdorf, A. Francillon, and S. Capkun, Analysis of the communication between colluding applications on modern smartphones, 28th Annual Computer Security Applications Conference, pp.51-60, 2012.

M. Neis, V. Cefalu, and A. Chattopadhyay, Developing a Unique Android App-driven Nifty Middle-School Educational Module on Mobile Security for Driving Basic Information Security Awareness and Generating Interests in Cybersecurity, 49th ACM Technical Symposium on Computer Science Education-SIGCSE '18, pp.1081-1081, 2018.

C. Ntantogian, D. Apostolopoulos, G. Marinakis, and C. Xenakis, Evaluating the privacy of Android mobile applications under forensic analysis, Computers & Security, vol.42, pp.66-76, 2014.

O. Peles and R. Hay, One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android, 9th USENIX Workshop on Offensive Technologies, pp.1-12, 2015.

M. Sonntag, Learning security through insecurity, 2nd International Conference on E-Learning and E-Technologies in Education, pp.143-148, 2013.

P. Stirparo, I. N. Fovino, and I. Kounelis, Data-in-use leakages from Android memory-Test and analysis, 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.718-725, 2013.

K. Sung and A. Samuel, Mobile application development classes for the mobile era, conference on Innovation & technology in computer science education, pp.141-146, 2014.

S. Tigrek and M. Obadat, Teaching smartphones programming using (Android Java): Pedagogy and innovation, 2012 International Conference on Information Technology Based Higher Education and Training, pp.1-7, 2012.
DOI : 10.1109/ithet.2012.6246039

, A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation, 17th Annual Conference on Information Technology Education, pp.48-53, 2016.

, Android based mobile apps for information security hands-on education, vol.22, pp.125-144, 2017.

M. Urbanski, W. Mazurczyk, J. Lalande, and L. Caviglione, Detecting Local Covert Channels Using Process Activity Correlation on Android Smartphones, International Journal of Computer Systems Science and Engineering, vol.32, issue.2, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01302828

X. Yuan, K. Williams, S. Mccrickard, C. Hardnett, H. Litany et al., Teaching mobile computing and mobile security, IEEE Frontiers in Education Conference, pp.1-6, 2016.

K. Yaghmour, Embedded Android: Porting, Extending, and Customizing