Y. Aafer, W. Du, and H. Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android, Security and Privacy in Communication Networks, pp.86-103, 2013.
DOI : 10.1145/2133601.2133640

A. Abraham, R. Andriatsimandefitra, A. Brunelat, J. Lalande, V. Viet-triem et al., GroddDroid: a gorilla for triggering malicious behaviors, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), 2015.
DOI : 10.1109/MALWARE.2015.7413692

URL : https://hal.archives-ouvertes.fr/hal-01201743

F. E. Allen, Control flow analysis, Proceedings of a Symposium on Compiler Optimization, pp.1-19, 1970.

K. Allix, T. F. Bissyandé, J. Klein, and Y. Le-traon, AndroZoo, Proceedings of the 13th International Workshop on Mining Software Repositories, MSR '16, pp.468-471, 2016.
DOI : 10.1109/SP.2012.16

A. Apvrille and R. Nigam, Obfuscation in android malware, and how to fight back. https://www.virusbulletin.com/virusbulletin/2014/07/obfus- cation-android-malware-and-how-fight-back, pp.2017-2023, 2014.

S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel et al., Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps, Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, pp.259-269, 2014.

Y. Cao, Y. Fratantonio, A. Bianchi, M. Egele, C. Kruegel et al., EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23140

P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M. S. Gaur et al., Android Security: A Survey of Issues, Malware Penetration, and Defenses, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.998-1022, 2015.
DOI : 10.1109/COMST.2014.2386139

Y. Fratantonio, A. Bianchi, W. Robertson, E. Kirda, C. Kruegel et al., Triggerscope: Towards detecting logic bombs in android applications Android security : 2016 year in review. https://source.android.com/security, IEEE Symposium on Security and Privacy (SP), pp.377-396, 2016.
DOI : 10.1109/sp.2016.30

M. Graa, N. Cuppens-boulahia, F. Cuppens, and A. Cavalli, Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses [12] IDC. Smartphone os market share, 2016 q2, pp.33-47, 2012.
DOI : 10.1007/978-3-642-35362-8_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.382.4249

M. Junaid, D. Liu, D. Kung14, ]. W. Klieber, L. Flynn et al., Dexteroid: Detecting malicious behaviors in android apps using reverse-engineered life cycle models. Computers and Security Android taint flow analysis for app sets, Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, pp.92-117, 2014.
DOI : 10.1016/j.cose.2016.01.008

URL : http://arxiv.org/abs/1506.05217

L. Li, D. Li, T. F. Bissyande, J. Klein, Y. Le-traon et al., Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting, IEEE Transactions on Information Forensics and Security, vol.12, issue.6, pp.1269-1284, 2017.
DOI : 10.1109/TIFS.2017.2656460

M. Lillack, C. Kästner, and E. Bodden, Tracking loadtime configuration options, Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering, ASE '14, pp.445-456, 2014.
DOI : 10.1145/2642937.2643001

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.434.3295

D. Octeau, P. Mcdaniel, S. Jha, A. Bartel, E. Bodden et al., Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis, Proceedings of the 22Nd USENIX Conference on Security, SEC'13, pp.543-558, 2013.

S. Poeplau, Y. Fratantonio, A. Bianchi, C. Kruegel, and G. Vigna, Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications, Proceedings 2014 Network and Distributed System Security Symposium, pp.23-26, 2014.
DOI : 10.14722/ndss.2014.23328

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.638.1902

V. Rastogi, Y. Chen, and X. Jiang, DroidChameleon, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.329-334, 2013.
DOI : 10.1145/2484313.2484355

J. Schütte, R. Fedler, and D. Titze, ConDroid: Targeted Dynamic Analysis of Android Applications, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp.571-578, 2015.
DOI : 10.1109/AINA.2015.238

K. Tam, S. J. Khan, A. Fattori, and L. Cavallaro, CopperDroid: Automatic Reconstruction of Android Malware Behaviors, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23145

R. Vallée-rai, P. Co, E. Gagnon, L. Hendren, P. Lam et al., Soot -a java bytecode optimization framework, Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON '99, p.13, 1999.

R. Vallee-rai and L. J. Hendren, Jimple: Simplifying java bytecode for analyses and transformations, 1998.

M. Y. Wong and D. Lie, IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware, Proceedings 2016 Network and Distributed System Security Symposium, 2016.
DOI : 10.14722/ndss.2016.23118

T. Wu, J. Liu, Z. Xu, C. Guo, Y. Zhang et al., Light-Weight, Inter-Procedural and Callback-Aware Resource Leak Detection for Android Apps, IEEE Transactions on Software Engineering, vol.42, issue.11, pp.421054-1076, 2016.
DOI : 10.1109/TSE.2016.2547385

C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong et al., SmartDroid, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.93-104, 2012.
DOI : 10.1145/2381934.2381950