1. M. Becher, F.C. Freiling, Towards dynamic malware analysis to increase mobile device security, in Sicherheit 2008 (2008), pp. 423–433
2. J. Bickford, R. O’Hare, A. Baliga, V. Ganapathy, L. Iftode, Rootkits on smart phones: attacks, implications and opportunities, in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile 2010) (2010), pp. 49–54
3. G. Delac, M. Silic, J. Krolo, Emerging security threats for mobile platforms, in 34th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2011) (2011), pp. 1468–1473
4. ESET Latin America’s Lab, Trends for 2013: astounding growth of mobile malwaree (2013), http://go.eset.com/us/resources/white-papers/Trends_for_2013_preview.pdf
5. A.P. Felt, M. Finifter, E. Chin, S. Hanna, D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011) (2011), pp. 3–14