Y. Aafer, W. Du, and H. Yin, Droidapiminer: Mining apilevel features for robust malware detection in android, Security and Privacy in Communication Networks, pp.86-103, 2013.

K. Allix, T. F. Bissyandé, J. Klein, and Y. Le-traon, Androzoo: Collecting millions of android apps for the research community, Proceedings of the 13th International Conference on Mining Software Repositories, MSR '16, pp.468-471, 2016.

S. Arzt, S. Rasthofer, and E. Bodden, Instrumenting Android and Java Applications as Easy as abc, Fourth International Conference on Runtime Verification, vol.8174, pp.364-381, 2013.

A. Bacci, A. Bartoli, F. Martinelli, E. Medvet, and F. Mercaldo, Detection of obfuscation techniques in android applications, Proceedings of the 13th International Conference on Availability, Reliability and Security, vol.2018, pp.1-57, 2018.

S. Dong, M. Li, W. Diao, X. Liu, J. Liu et al., Understanding android obfuscation techniques: A large-scale investigation in the wild, Security and Privacy in Communication Networks, pp.172-192, 2018.

A. Feizollah, N. B. Anuar, R. Salleh, and A. W. Wahab, A review on feature selection in mobile malware detection, Digital Investigation, vol.13, pp.22-37, 2015.

Y. Feng, S. Anand, I. Dillig, and A. Aiken, Apposcopy: Semantics-based detection of android malware through static analysis, Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp.576-587, 2014.

, Hispasec Sistemas. Virus Total

M. Leslous, V. Viet-triem, J. Tong, T. Lalande, and . Genet, GPFinder: Tracking the Invisible in Android Malware, 12th International Conference on Malicious and Unwanted Software, pp.39-46, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01584989

M. Leslous, V. Viet-triemtong, J. Lalande, and T. Genet, Gpfinder: Tracking the invisible in android malware, 2017 12th International Conference on Malicious and Unwanted Software (MALWARE), pp.39-46, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01584989

D. Li, T. F. Li, J. Bissyande, Y. Klein, D. Le-traon et al., Understanding android app piggybacking: A systematic study of malicious code grafting, Trans. Info. For. Sec, vol.12, issue.6, pp.1269-1284, 2017.

L. Li, D. Li, T. F. Bissyande, J. Klein, Y. Le-traon et al., Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting, IEEE Transactions on Information Forensics and Security, vol.12, 2017.

E. Novella, Apkid: "peid" for android applications. Black Hat Europe, 2018.

F. Pendlebury, F. Pierazzi, R. Jordaney, J. Kinder, and L. Cavallaro, Tesseract: Eliminating experimental bias in malware classification across space and time, 2018.

. Virusshare and . Virusshare, com -Because Sharing is Caring

C. Yang, Z. Xu, G. Gu, V. Yegneswaran, and P. Porras, Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications, Computer Security -ESORICS 2014, pp.163-182, 2014.

W. Yang, X. Xiao, B. Andow, S. Li, T. Xie et al., Appcontext: Differentiating malicious and benign mobile app behaviors using context, Proceedings of the 37th International Conference on Software Engineering, vol.1, pp.303-313, 2015.

M. Zhang, Y. Duan, H. Yin, and Z. Zhao, Semantics-aware android malware classification using weighted contextual api dependency graphs, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1105-1116, 2014.

Y. Zhou and X. Jiang, Dissecting android malware: Characterization and evolution, 2012 IEEE Symposium on Security and Privacy, pp.95-109, 2012.