M. Xu, C. Song, Y. Ji, M. Shih, K. Lu et al., Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques, ACM Comput. Surv, vol.49, issue.2, 2016.

M. Backes, S. Bugiel, E. Derr, P. Mcdaniel, D. Octeau et al., On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, 2016.

D. Octeau, P. Mcdaniel, S. Jha, A. Bartel, E. Bodden et al., Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis, Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, 2013.

U. Kanonov and A. Wool, Secure Containers in Android: The Samsung KNOX Case Study, Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM '16, 2016.

T. K. Lengyel, T. Kittel, J. Pfoh, and C. Eckert, Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions, 2014 25th International Workshop on Database and Expert Systems Applications, 2014.

Y. Cho, J. Shin, D. Kwon, M. Ham, Y. Kim et al., HardwareAssisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, 2016 USENIX Annual Technical Conference (USENIX ATC 16). USENIX Association, 2016.

H. Sun, K. Sun, Y. Wang, J. Jing, and H. Wang, TrustICE: HardwareAssisted Isolated Computing Environments on Mobile Devices, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015.
DOI : 10.1109/dsn.2015.11

W. Xu and Y. Fu, Own Your Android! Yet Another Universal Root, 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, 2015.

E. Fernandes, A. Aluri, A. Crowell, and A. Prakash, Decomposable Trust for Android Applications, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015.

S. Smalley and R. Craig, Security Enhanced (SE) Android: Bringing Flexible MAC to Android, NDSS, vol.310, 2013.

S. Heuser, A. Nadkarni, W. Enck, and A. Sadeghi, ASM: A Programmable Interface for Extending Android Security, 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, 2014.

P. Ratazzi, A. Bommisetti, N. Ji, and W. Du, PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy, Proceedings of the SPW Workshop on Mobile Security Technologies (MoST), 2015.

S. Neuner, V. Van-der-veen, M. Lindorfer, M. Huber, G. Merzdovnik et al., Enter sandbox: Android sandbox comparison, Proceedings of the Third Workshop on Mobile Security Technologies (MoST), 2014.

W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. Chun et al., TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, ACM Trans. Comput. Syst, vol.32, issue.2, 2014.

M. Sun, T. Wei, and J. C. Lui, TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '16, 2016.
DOI : 10.1109/apsec.2017.89

M. Backes, S. Bugiel, C. Hammer, O. Schranz, and P. Von-styprekowsky, Boxify: Full-fledged App Sandboxing for Stock Android, 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, 2015.

A. Bianchi, Y. Fratantonio, C. Kruegel, and G. Vigna, NJAS: Sandboxing Unmodified Applications in Non-rooted Devices Running Stock Android, Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM '15, 2015.