P. Sivakumaran and J. Blasco, Attacks Against BLE Devices by Colocated Mobile Applications, ArXiv E-Prints, 2018.

M. Naveed, X. Zhou, S. Demetriou, X. Wang, and C. A. Gunter, Inside Job: Understanding and Mitigating the Threat of External Device MisBonding on Android, Proceedings 2014 Network and Distributed System Security Symposium, 2014.

T. Guo, P. Zhang, H. Liang, and S. Shao, Enforcing Multiple Security Policies for Android System, 2nd International Symposium on Computer, Communication, Control and Automation, 2013.
DOI : 10.2991/3ca-13.2013.42

URL : https://download.atlantis-press.com/article/10158.pdf

S. Smalley and R. Craig, Security Enhanced (SE) Android: Bringing Flexible MAC to Android, NDSS, vol.310, 2013.

M. Conti, B. Crispo, E. Fernandes, and Y. Zhauniarovich, CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android, IEEE Trans. Inf. Forensics Secur, vol.7, issue.5, 2012.
DOI : 10.1109/tifs.2012.2204249

Y. Zhauniarovich, G. Russello, M. Conti, B. Crispo, and E. Fernandes, MOSES: Supporting and Enforcing Security Profiles on Smartphones, IEEE Trans. Dependable Secure Comput, vol.11, issue.3, 2014.
DOI : 10.1109/tdsc.2014.2300482

F. Rohrer, Y. Zhang, L. Chitkushev, and T. Zlateva, DR BACA: Dynamic Role Based Access Control for Android, Proceedings of the 29th Annual Computer Security Applications Conference, 2013.

J. Abdella, M. Ozuysal, and E. Tomur, CA-ARBAC: Privacy preserving using context-aware role-based access control on Android permission system, Secur. Commun. Netw, vol.9, issue.18, 2017.

M. Miettinen, S. Heuser, W. Kronz, A. Sadeghi, and N. Asokan, ConXsense: Automated Context Classification for Context-aware Access Control, Proceedings of the 9th ACM Symposium on Information, 2014.

K. Olejnik, I. Dacosta, J. Soares-machado, K. Huguenin, M. E. Khan et al., SmarPer: Context-Aware and Automatic RuntimePermissions for Mobile Devices, 38th IEEE Symposium on Security and Privacy (S&P), 2017.
URL : https://hal.archives-ouvertes.fr/hal-01489684

G. Averlant, Multi-level Isolation for Android Applications, Software Reliability Engineering Workshops, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01885138

S. Bugiel, S. Heuser, A. Sadeghi, and T. U. Darmstadt, Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware, Tech. Rep, 2012.

S. Heuser, A. Nadkarni, W. Enck, and A. Sadeghi, ASM: A Programmable Interface for Extending Android Security, 23rd USENIX Security Symposium (USENIX Security 14), 2014.

Y. Fratantonio, C. Qian, S. Chung, and W. Lee, Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop, Proceedings of the IEEE Symposium on Security and Privacy, 2017.

B. Morgan, E. Alata, V. Nicomette, M. Kâaniche, and G. Averlant, Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring, 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), 2015.
URL : https://hal.archives-ouvertes.fr/hal-01322882