1. Becher, M., Freiling, F., Hoffmann, J., Holz, T., Uellenbeck, S., Wolf, C.: Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In: Proc. of the 2011 IEEE Symposium on Security and Privacy (SP 2011), pp. 96–111. IEEE Computer Society, USA (2011)
2. Caldwell, T.: Smart security. Network Security 2011(4), 5–9 (2011)
3. Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.: Quire: lightweight provenance for smart phone operating systems. In: 20th USENIX Security Symposium, USA (2011)
4. Dlamini, M., Eloff, J., Eloff, M.: Information security: The moving target. Computers & Security 28(3-4), 189–198 (2009)
5. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of android application security. In: Proc. of the 20th USENIX Conference on Security (SEC 2011), USA, p. 21 (2011)