. Android, Package Index. https://developer.android.com/reference/ packages.html, [Online; accessed 6, 2017.

. Android, The Activity Lifecycle. https://developer.android.com/guide/ components/activities/activity-lifecycle.html, [Online, 2017.

M. T. Azim, I. Neamtiu, and L. M. Marvel, Towards self-healing smartphone software via automated patching, Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, ASE '14, 2014.
DOI : 10.1145/2642937.2642955

URL : http://www.cs.ucr.edu/~neamtiu/pubs/ase14azim.pdf

C. Baier, J. P. Katoen, and K. G. Larsen, Principles of model checking, 2008.

A. Banerjee, L. K. Chong, S. Chattopadhyay, and A. Roychoudhury, Detecting energy bugs and hotspots in mobile apps, Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, 2014.
DOI : 10.1145/2635868.2635871

A. Bauer, J. Küster, and G. Vegliach, Runtime Verification Meets Android Security, Proceedings of the International Symposium on Formal Methods (NFM), 2012.
DOI : 10.1007/978-3-642-28891-3_18

URL : http://www.nicta.com.au/pub?doc=5472

L. Bauer, J. Ligatti, and D. Walker, Composing Security Policies with Polymer, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2005.
DOI : 10.1145/1065010.1065047

URL : http://www.ece.cmu.edu/~lbauer/papers/2005/pldi2005-polymer.pdf

J. Bengtsson, K. Larsen, F. Larsson, P. Pettersson, and W. Yi, UPPAAL ? a tool suite for automatic verification of real-time systems, pp.232-243, 1996.

N. Bielova and F. Massacci, Do you really mean what you actually enforced?, International Journal of Information Security, vol.206, issue.2???4, pp.239-254, 2011.
DOI : 10.1145/353323.353382

L. Chircop, C. Colombo, and G. J. Pace, Device-Centric Monitoring for Mobile Device Management, Proceedings of the International Workshop on Formal Engineering approaches to Software Components and Architectures (FESCA), 2016.
DOI : 10.1007/978-3-642-04694-0_13

URL : http://arxiv.org/pdf/1603.08634

E. M. Clarke, E. A. Emerson, and A. P. Sistla, Automatic verification of finite-state concurrent systems using temporal logic specifications, ACM Transactions on Programming Languages and Systems, vol.8, issue.2, pp.244-263, 1986.
DOI : 10.1145/5397.5399

Y. Dai, Y. Xiang, and G. Zhang, Self-healing and Hybrid Diagnosis in Cloud Computing, Proceedings of the International Conference on Cloud Computing, 2009.
DOI : 10.1007/978-3-642-10665-1_5

P. Daian, Y. Falcone, P. O. Meredith, T. Serbanuta, S. Shiriashi et al., RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial, Runtime Verification -6th International Conference, pp.342-357, 2015.
DOI : 10.1007/978-3-540-77395-5_3

URL : https://hal.archives-ouvertes.fr/hal-01248350

Y. Falcone, S. Currea, and M. Jaber, Runtime Verification and Enforcement for Android Applications with RV-Droid, Proceedings of the International Conference on Runtime Verification (RV), 2012.
DOI : 10.1007/978-3-642-35632-2_11

URL : https://hal.archives-ouvertes.fr/hal-00857292

Y. Falcone, J. C. Fernandez, and L. Mounier, What can you verify and enforce at runtime?, International Journal on Software Tools for Technology Transfer, vol.3, issue.1, pp.349-382, 2012.
DOI : 10.1145/353323.353382

URL : https://hal.archives-ouvertes.fr/hal-00497350

Y. Falcone, T. Jéron, H. Marchand, and S. Pinisetty, Runtime enforcement of regular timed properties by suppressing and delaying events, Science of Computer Programming, vol.123, pp.2-41, 2016.
DOI : 10.1016/j.scico.2016.02.008

URL : https://hal.archives-ouvertes.fr/hal-01281727

Y. Falcone, L. Mounier, J. C. Fernandez, and J. L. Richier, Runtime enforcement monitors: composition, synthesis, and enforcement abilities, Formal Methods in System Design, vol.42, issue.3, pp.223-262, 2011.
DOI : 10.1145/1273442.1250746

URL : https://hal.archives-ouvertes.fr/hal-00576948

C. Guo, J. Zhang, J. Yan, Z. Zhang, and Y. Zhang, Characterizing and detecting resource leaks in Android applications, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013.
DOI : 10.1109/ASE.2013.6693097

C. A. Hoare, Communicating sequential processes In: The origin of concurrent programming, pp.413-443, 1978.

S. Hyrynsalmi, A. Suominen, T. Mäkilä, and T. Knuutila, Mobile Application Ecosystems, pp.1418-1434, 2016.
DOI : 10.4018/978-1-4666-9787-4.ch100

R. Khoury and N. Tawbi, Which security policies are enforceable by runtime monitors? A survey, Computer Science Review, vol.6, issue.1, pp.27-45, 2012.
DOI : 10.1016/j.cosrev.2012.01.001

J. Küster and A. Bauer, Monitoring Real Android Malware, Proceedings of the International Conference on Runtime Verification (RV), 2015.
DOI : 10.1109/SP.2012.16

L. Li, T. F. Bissyandé, D. Octeau, and J. Klein, DroidRA: taming reflection to support whole-program analysis of Android apps, Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA 2016, 2016.
DOI : 10.1145/2590296.2590312

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1145/325694.325728

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009.
DOI : 10.1145/1455526.1455532

N. A. Lynch and M. R. Tuttle, An introduction to input, 1988.

J. A. Magalhães and L. M. Silva, WA, ACM Transactions on Autonomous and Adaptive Systems, vol.10, issue.1, pp.1-428, 2015.
DOI : 10.1080/01621459.1972.10481251

S. Pinisetty, Y. Falcone, T. Jéron, H. Marchand, A. Rollet et al., Runtime enforcement of timed properties revisited, Formal Methods in System Design, vol.10, issue.3, pp.381-422, 2014.
DOI : 10.1007/s10207-011-0137-2

URL : https://hal.archives-ouvertes.fr/hal-01088136

O. Riganelli, D. Micucci, and L. Mariani, Healing Data Loss Problems in Android Apps, 2016 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2016.
DOI : 10.1109/ISSREW.2016.50

URL : http://arxiv.org/pdf/1701.05467

O. Riganelli, D. Micucci, and L. Mariani, Policy Enforcement with Proactive Libraries, 2017 IEEE/ACM 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2017.
DOI : 10.1109/SEAMS.2017.9

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

Z. Shan, T. Azim, and I. Neamtiu, Finding resume and restart errors in android applications, Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 2016.
DOI : 10.1145/2983990.2984011

S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh et al., AS- SURE: Automatic software self-healing using rescue points, Proceedings of the