1. Yan Q., Y. Li, T. Li, and R. Deng, “Insights into Malware: Detection and Prevention on Mobile Phones,” in Security Technology, D. S ́lzak, T.-h. Kim, W.-C. Fang, and K. P. Arnett, Eds. Springer Berlin Heidelberg, 2009, vol. 58, ch. 30, pp. 242-249.
2. Becher M., “Security of Smartphones at the Dawn of their Ubiquitousness,”Ph.D. dissertation, Universita ̈t Mannheim, 2009.
3. Schlegel R., K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang, “Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones,” in Proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2011.
4. Mulliner C. and C. Miller, “Injecting SMS messages into smart phones for security analysis,” in WOOT’09: Proceedings of the 3rd USENIX conference on Offensive technologies. Berkeley, CA, USA:;1; USENIX Association, 2009, pp. 5-5.
5. “A Survey on Security for Mobile Devices”;La;IEEE Communications Surveys & Tutorials,2013