
N. B. Zainuddin et al.
OALibJ | DOI:10.4236/oalib.1101229 6 December 2014 | Volume 1 |
[6] Ki m, S., Bettenburg, N. and Zi mmermann , T. (2013) Predicting Method Crashes. Proceedings of 6th India Softw ar e Engi -
neering Conference, New Delhi, 21-23 Februa r y 2013, 1-5.
[7] Maj i, A.K., Ars h ad , F.A., Bagchi , S. and Rellermeyer, J.S. (2012) An Empirical Study of the Robustness of In-
ter-Component Communication in Android. 2012 42nd Annual IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN), Boston, 25-28 June 2012, 1-12.
[8] Isohara, T. , Takemori, K. and Kubota, A. (2011) Kernel -Based Behavior Analysis for Android Malware Detectio n. 2011
7th International Conference on Computational Intelligence and Security (CIS), Hainan, 3-4 December 2011, 1011-
1015. http://dx.doi.org/10.1109/CIS.2011.226
[9] Luo, H., He, G., Lin, X. and (Sherman) Shen, X. (2012) Towards Hierarchical Security Framework for Smartphones.
2012 1st IEEE International Conference on Communications in China (ICCC), Beijing, 15-17 August 2012, 214-219 .
[10] Del ac, G., Silic, M. and Krolo, J. (2011) Emerging Security Threats for Mobile Platforms. MIPRO 2011 Proceedings
of the 34th International Convention, Opatija, 23-27 May 2011, 1468-1473.
[11] Pocatilu, P. (2011) Android Applications Security. Information Economics, 15, 163-172.
[12] Joshi, M. (2012) Analysis and Debugging of OEM’s.
[13] Pen g, L. , P eir, J.K. , Prakash, T.K., Staelin, C., Chen, Y.K. and Koppelman, D. (2008) Memory Hierar ch y Perfo rmance
Measurement of Commercial Dual-Core Desk top Pr oc e s s or s . Journal of Syst em s Architecture, 54, 816-828.
http://dx.doi.org/10.1016/j.sysarc.2008.02.004
[14] Park, J. and Cho i, B. (2012) Automated Memor y Leakage Detection in Android Based Syste ms. International Journal
of C ontrol Automat ion and S ystems, 5, 35-42.
[15] S hahri ar, H., Nor th , S . and Mawangi , E. (2014) Testing of Memory Leak in Android Applications. IEEE 15th Interna-
tional Symposium on High Assurance Systems Engineering, Miami Beach, 9-11 January 2014, 176-183.
[16] Wei, X. (2013) ProfileDroid : Multi-Layer Profiling of Android Applications Categories and Subject Descriptors. Pro-
cee dings of the 18th A nn ual Int e r n ati onal M obi le C om puting and N e twor k ing, Istanbul, 22-26 August 2012, 1-12.
[17] Burguera, I. and Zurutuza, U. (2011) Crowdroid : Beh avi o r-Based Malware Detection System for Android. Proceed-
ings of the 18th ACM Computer and Communications Securi ty, Illnois, 17 Oct ober 2011, 15-25.
[18] S habtai, A., Kanonov, U., Elovici, Y., Glezer, C. and Weiss, Y. (2011) “Andromaly”: A Behavioral Malware Detection
Framewor k for Androi d Devi ces . Journal of Intelligent Information Systems, 38, 161-190.
http://dx.doi.org/10.1007/s10844-010-0148 -x
[19] Bl, T., B atyuk, L., Schmidt, A., Camtepe, S.A. , Albayrak, S. and Universit, T. (2010) An Android Application Sand-
box System for Suspicious Software Detection. 5th International Conference on Malicious and Unwanted Software,
France, 19-20 Oct obe r 2010, 55-62.
[20] Karami, M., Elsabagh, M., Najafiborazj ani, P. and Stavrou, A. (2013) Behavioral Analysis of Android Applications
Using Automated Instrumentation. IEEE 7th International Conference on Software Security and Reliability Compa-
nion, Washington DC, 18-20 June 2013, 182-187.
[21] Kim, H. (2011) MODELZ: Monitoring, Detection, and Analysis of Energy-Greedy Anomalies in Mobile Handsets.
IEEE Transactions on Mobile Computing, 10, 968-981. http://dx.doi.org/10.1109/TMC.2010.245
[22] Ala zab, M. , Monsamy, V., Batten, L., Lantz, P. and Tian, R. (2012) Analysis of Malicious and Benign Android Appli-
cation s. 32nd International Conference on Distributed Computing Systems Workshops, Macau, 1 8-21 June 2013, 608-
616.
[23] Thing, V.L.L., Subramaniam, P.P., Tsai, F.S. and Chua, T. (2011) Mobile Phone Anomalous Behaviour Detection for
Real-Time Information Theft Tracking. CYBERLAWS 2nd International Conference on Technical and Legal Aspects of
the e-Society, Guadel o upe , 23-28 Fe br ua r y 2011, 7-11.
[24] Guo, C., Zhang, J., Yan, J., Zh ang, Z. and Zhang, Y. (2013) Characterizing and Detecting Resource Leaks in Android Ap-
plications. 28 th IEEE/ACM International Conference on Automated Software Engineering, Silicon Valley, 11-15 No-
vember 2013, 389-398.
[25] Yan, D. (2013) Systematic Testing for Resource Leaks in Android Applications. IEEE 24 th International Symposium
on Software Reliability Engineering, Pasadena, 4-7 November 2013, 411-420.
[26] F r a nke, D. and Roy, T. (2012) AndroLIFT : A Tool for Android Application Life Cycles. VALID 2012 4th Internation-
al Confer e nc e on A dvances in System Testing and Validation Lifecycle, Lisbon, 8 November 2012, 28-33.
[27] Is ohara, T., Take mo r i, K . and Kubota, A. (2011) Kern el -Based Beh avior Anal ysis for Andro id Malware Detect ion . 7th
International Conference on Computational Intelligence Security, Hainan , 3-4 December 2011, 1011-1015.
http://dx.doi.org/10.1109/CIS.2011.226