A. V. Aho, R. Sethi, and J. D. Ullman, Compilers, Principles Techniques and Tools, 1986.

D. Barrera, H. G. Kayacik, P. C. Van-oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to Android, Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), pp.73-84, 2010.

S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A. Sadeghi et al., Towards taming privilege-escalation attacks on Android, Proceedings of the 19th Network and Distributed System Security Symposium (NDSS'12), 2012.

E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, Analyzing interapplication communication in Android, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys'11), pp.239-252, 2011.

M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach, QUIRE: Lightweight provenance for smart phone operating systems, Proceedings of the 20th USENIX Security Symposium. USENIX Association, 2011.

W. Enck, P. Gilbert, B. Chun, L. P. Cox, J. Jung et al., TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones, Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI'10), pp.393-407, 2010.

W. Enck, D. Octeau, P. Mcdaniel, and S. Chaudhuri, A study of Android application security, Proceedings of the 20th USENIX Security Symposium (SEC'11). USENIX Association, 2011.

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), pp.627-638, 2011.

A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, Permission re-delegation: Attacks and defenses, Proceedings of the 20th USENIX Security Symposium. USENIX Association, 2011.

A. P. Fuchs, A. Chaudhuri, and J. S. Foster, SCanDroid: Automated Security Certification of Android Applications, 2009.

C. M. Hayden, S. Magill, M. Hicks, N. Foster, and J. S. Foster, Specifying and verifying the correctness of dynamic software updates, Proceedings of the 4th International Conference on Verified Software: Theories, Tools, Experiments (VSTTE'12), vol.7152, pp.278-293, 2012.

J. Jeon, K. K. Micinski, and J. S. Foster, SymDroid: Symbolic execution for Dalvik bytecode, 2012.

J. Juliasrl and . Srl,

J. Kim, Y. Yoon, K. Yi, and J. Shin, SCANDAL: Static analyzer for detecting privacy leaks in Android applications. Mobile Security Technologies (MoST'12), a part of the IEEE Computer Society Security and Privacy Workshops, 2012.

. Klocwork and . Klocwork,

J. Palsberg and M. I. Schwartzbach, Object-Oriented Type Inference, Proc. of the Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA'91), vol.26, pp.146-161, 1991.

E. Payet and F. Spoto, Static analysis of Android programs. Information & Software Technology, vol.54, pp.1192-1201, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01188018

F. Spoto, F. Mesnard, and E. Payet, A termination analyzer for Java bytecode based on path-length, ACM Transactions on Programming Languages and Systems, vol.32, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01186167

F. Tip and J. Palsberg, Scalable Propagation-based Call Graph Construction Algorithms, Proceedings of the 2000 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages & Applications (OOPSLA), pp.281-293, 2000.

E. R. Wognsen and H. S. Karlsen, Static analysis of Dalvik bytecode and reflection in Android, 2012.