1. Unravelling security issues of runtime permissions in android;Alepis;J. Hardw. Syst. Secur.,2019
2. Au, K.W.Y., Zhou, Y.F., Huang, Z., Lie, D., 2012. Pscout: analyzing the android permission specification. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 217–228.
3. Bonné, B., Peddinti, S.T., Bilogrevic, I., Taft, N., 2017. Exploring decision making with Android’s runtime permission dialogs using in-context surveys. In: Thirteenth Symposium on Usable Privacy and Security. {SOUPS} 2017, pp. 195–210.
4. Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements;Breaux;Requir. Eng.,2014
5. Scaling requirements extraction to the crowd: Experiments with privacy policies;Breaux,2014