1. FlowDroid
2. Arini Balakrishnan and Chloe Schulze . 2005. Code obfuscation literature survey. CS701 Construction of compilers 19 ( 2005 ), 31. Arini Balakrishnan and Chloe Schulze. 2005. Code obfuscation literature survey. CS701 Construction of compilers 19 (2005), 31.
3. Theodore Book , Adam Pridgen , and Dan S Wallach . 2013. Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857 ( 2013 ). Theodore Book, Adam Pridgen, and Dan S Wallach. 2013. Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857 (2013).
4. David Brumley , Cody Hartwig , Zhenkai Liang , James Newsome , Dawn Song , and Heng Yin . 2008. Automatically identifying trigger-based behavior in malware. Botnet Detection: Countering the Largest Security Threat ( 2008 ), 65--88. David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Song, and Heng Yin. 2008. Automatically identifying trigger-based behavior in malware. Botnet Detection: Countering the Largest Security Threat (2008), 65--88.
5. Achieving accuracy and scalability simultaneously in detecting application clones on Android markets