1. Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H. (2010). Paranoid android: versatile protection for smartphones. In Proceedings of the 26th annual computer security applications conference (ACSAC’10), New York (pp. 347–356).
2. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Google android: a comprehensive security assessment. IEEE Security & Privacy, 8, 35–44.
3. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX conference on offensive technologies (WOOT’10), Berkeley, CA, USA (pp. 1–7).
4. Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for deferent security methods on mobile phones. In Proceedings of the 13th international conference on human computer interaction with mobile devices and services (Mobile HCI ’11), New York (pp. 465–473).
5. Conti, M., Zachia-Zlatea, I., & Crispo, B. (2011). Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call. In Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS ’11), New York (pp. 249–259).