Package Index. https://developer.android.com/reference/ packages.html, [Online; accessed 6, 2017. ,
The Activity Lifecycle. https://developer.android.com/guide/ components/activities/activity-lifecycle.html, [Online, 2017. ,
Towards self-healing smartphone software via automated patching, Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, ASE '14, 2014. ,
DOI : 10.1145/2642937.2642955
URL : http://www.cs.ucr.edu/~neamtiu/pubs/ase14azim.pdf
Principles of model checking, 2008. ,
Detecting energy bugs and hotspots in mobile apps, Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, 2014. ,
DOI : 10.1145/2635868.2635871
Runtime Verification Meets Android Security, Proceedings of the International Symposium on Formal Methods (NFM), 2012. ,
DOI : 10.1007/978-3-642-28891-3_18
URL : http://www.nicta.com.au/pub?doc=5472
Composing Security Policies with Polymer, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2005. ,
DOI : 10.1145/1065010.1065047
URL : http://www.ece.cmu.edu/~lbauer/papers/2005/pldi2005-polymer.pdf
UPPAAL ? a tool suite for automatic verification of real-time systems, pp.232-243, 1996. ,
Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011. ,
DOI : 10.1145/353323.353382
Device-Centric Monitoring for Mobile Device Management, Proceedings of the International Workshop on Formal Engineering approaches to Software Components and Architectures (FESCA), 2016. ,
DOI : 10.1007/978-3-642-04694-0_13
URL : http://arxiv.org/pdf/1603.08634
Automatic verification of finite-state concurrent systems using temporal logic specifications, ACM Transactions on Programming Languages and Systems, vol.8, issue.2, pp.244-263, 1986. ,
DOI : 10.1145/5397.5399
Self-healing and Hybrid Diagnosis in Cloud Computing, Proceedings of the International Conference on Cloud Computing, 2009. ,
DOI : 10.1007/978-3-642-10665-1_5
RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial, Runtime Verification -6th International Conference, pp.342-357, 2015. ,
DOI : 10.1007/978-3-540-77395-5_3
URL : https://hal.archives-ouvertes.fr/hal-01248350
Runtime Verification and Enforcement for Android Applications with RV-Droid, Proceedings of the International Conference on Runtime Verification (RV), 2012. ,
DOI : 10.1007/978-3-642-35632-2_11
URL : https://hal.archives-ouvertes.fr/hal-00857292
What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.349-382, 2012. ,
DOI : 10.1145/353323.353382
URL : https://hal.archives-ouvertes.fr/hal-00497350
Runtime enforcement of regular timed properties by suppressing and delaying events, Science of Computer Programming, vol.123, pp.2-41, 2016. ,
DOI : 10.1016/j.scico.2016.02.008
URL : https://hal.archives-ouvertes.fr/hal-01281727
Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011. ,
DOI : 10.1145/1273442.1250746
URL : https://hal.archives-ouvertes.fr/hal-00576948
Characterizing and detecting resource leaks in Android applications, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013. ,
DOI : 10.1109/ASE.2013.6693097
Communicating sequential processes In: The origin of concurrent programming, pp.413-443, 1978. ,
Mobile Application Ecosystems, pp.1418-1434, 2016. ,
DOI : 10.4018/978-1-4666-9787-4.ch100
Which security policies are enforceable by runtime monitors? A survey, Computer Science Review, vol.6, issue.1, pp.27-45, 2012. ,
DOI : 10.1016/j.cosrev.2012.01.001
Monitoring Real Android Malware, Proceedings of the International Conference on Runtime Verification (RV), 2015. ,
DOI : 10.1109/SP.2012.16
DroidRA: taming reflection to support whole-program analysis of Android apps, Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA 2016, 2016. ,
DOI : 10.1145/2590296.2590312
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005. ,
DOI : 10.1145/325694.325728
Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009. ,
DOI : 10.1145/1455526.1455532
An introduction to input, 1988. ,
WA, ACM Transactions on Autonomous and Adaptive Systems, vol.10, issue.1, pp.1-428, 2015. ,
DOI : 10.1080/01621459.1972.10481251
Runtime enforcement of timed properties revisited, Formal Methods in System Design, vol.10, issue.3, pp.381-422, 2014. ,
DOI : 10.1007/s10207-011-0137-2
URL : https://hal.archives-ouvertes.fr/hal-01088136
Healing Data Loss Problems in Android Apps, 2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2016. ,
DOI : 10.1109/ISSREW.2016.50
URL : http://arxiv.org/pdf/1701.05467
Policy Enforcement with Proactive Libraries, 2017 IEEE/ACM 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2017. ,
DOI : 10.1109/SEAMS.2017.9
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Finding resume and restart errors in android applications, Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 2016. ,
DOI : 10.1145/2983990.2984011
AS- SURE: Automatic software self-healing using rescue points, Proceedings of the ,