@misc(cyano, title = {{CyanogenMod}}, note = {\url{http://www.cyanogenmod.org/} , [Online; accessed 30-April-2015]}, ) @misc(mobile, title = {{San Francisco ZTE Blade Mobile Phone}}, note = {\url{http://www.gsmarena.com/zte_blade-3391.php} , [Online; accessed 30-April-2015]}, ) @misc(childStudy, title = {{Study for insight on Mobile Device Usage}}, note = {\url{https://s3-ap-southeast-1.amazonaws.com/tap-sg-media/theAsianparent+Insights+Device+Usage+A+Southeast+Asia+Study+November+2014.pdf} , [Online; accessed 25-March-2015]}, ) @article(runtimeVerification2, author = {Cyrille Artho and Howard Barringer and Allen Goldberg and Klaus Havelund and Sarfraz Khurshid and Mike Lowry and Corina Pasareanu and Ro{\c{s}}u, Grigore and Koushik Sen and Willem Visser}, year = {2005}, title = {Combining test case generation and runtime verification}, journal = {Theoretical Computer Science}, volume = {336}, number = {2}, pages = {209--234}, doi = {10.1016/j.tcs.2004.11.007}, ) @inproceedings(orchestration, author = {Fabio Barbon and Paolo Traverso and Marco Pistore and Michele Trainotti}, year = {2006}, title = {Run-Time Monitoring of Instances and Classes of Web Service Compositions}, booktitle = {ICWS '06: Proceedings of the IEEE International Conference on Web Services}, publisher = {IEEE Computer Society}, address = {Washington, DC, USA}, pages = {63--71}, doi = {10.1109/ICWS.2006.113}, ) @inproceedings(AndSec, author = {Andreas Bauer and Jan-Christoph K{\"u}ster and Gil Vegliach}, year = {2012}, title = {Runtime Verification meets {A}ndroid Security}, booktitle = {Proceedings of the 4th NASA Formal Methods Symposium ({NFM})}, series = {LNCS}, volume = {7226}, publisher = {Springer}, pages = {174--180}, doi = {10.1007/978-3-642-28891-3\_18}, ) @incollection(polylarva, author = {Christian Colombo and Adrian Francalanza and Ruth Mizzi and Gordon J Pace}, year = {2012}, title = {polylarva: Runtime verification with configurable resource-aware monitoring boundaries}, booktitle = {Software Engineering and Formal Methods}, publisher = {Springer}, pages = {218--232}, doi = {10.1007/978-3-642-33826-7\_15}, ) @inproceedings(choreo2, author = {Thomas S. Cook and Doron Drusinksy and Man-Tak Shing}, year = {2007}, title = {Specification, Validation and Run-time Moniroting of SOA Based System-of Systems Temporal Behaviors}, booktitle = {System of Systems Engineering (SoSE)}, publisher = {IEEE Computer Society}, doi = {10.1109/SYSOSE.2007.4304313}, ) @inproceedings(runtimeVerification3, author = {Marcelo d'Amorim and Klaus Havelund}, year = {2005}, title = {Event-based runtime verification of Java programs}, booktitle = {ACM SIGSOFT Software Engineering Notes}, volume = {30}, organization = {ACM}, pages = {1--7}, doi = {10.1007/978-3-642-03240-0\_13}, ) @inproceedings(TaintDroid, author = {William Enck and Peter Gilbert and Byung-Gon Chun and Landon P. Cox and Jaeyeon Jung and Patrick McDaniel and Anmol N. Sheth}, year = {2010}, title = {TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones}, booktitle = {Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation}, series = {OSDI'10}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, pages = {1--6}, doi = {10.1.1.179.3303}, url = {http://dl.acm.org/citation.cfm?id=1924943.1924971}, ) @incollection(RVDroid, author = {Yliès Falcone and Sebastian Currea and Mohamad Jaber}, year = {2013}, title = {Runtime Verification and Enforcement for Android Applications with RV-Droid}, editor = {Shaz Qadeer and Serdar Tasiran}, booktitle = {Runtime Verification}, series = {Lecture Notes in Computer Science}, volume = {7687}, publisher = {Springer Berlin Heidelberg}, pages = {88--95}, doi = {10.1007/978-3-642-35632-2\_11}, ) @incollection(WeaveDroid, author = {Yliès Falcone and Sebastian Currea and Mohamad Jaber}, year = {2013}, title = {Runtime Verification and Enforcement for Android Applications with RV-Droid}, editor = {Shaz Qadeer and Serdar Tasiran}, booktitle = {Runtime Verification}, series = {Lecture Notes in Computer Science}, volume = {7687}, publisher = {Springer Berlin Heidelberg}, pages = {88--95}, doi = {10.1007/978-3-642-35632-2\_11}, ) @article(dist, author = {Adrian Francalanza and Andrew Gauci and Gordon J. Pace}, year = {2013}, title = {Distributed system contract monitoring}, journal = {The Journal of Logic and Algebraic Programming}, volume = {82}, number = {5-7}, pages = {186--215}, doi = {10.1016/j.jlap.2013.04.001}, url = {http://www.sciencedirect.com/science/article/pii/S1567832613000234}, note = {Formal Languages and Analysis of Contract-Oriented Software (FLACOS'11)}, ) @article(MTLAndroid, author = {Hendra Gunadi and Alwen Tiu}, year = {2013}, title = {Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating System.}, journal = {CoRR}, volume = {abs/1311.2362}, doi = {10.1007/978-3-319-06410-9\_21}, url = {http://dblp.uni-trier.de/db/journals/corr/corr1311.html#GunadiT13}, ) @article(runtimeVerification, author = {Martin Leucker and Christian Schallhart}, year = {2009}, title = {A brief account of runtime verification}, journal = {The Journal of Logic and Algebraic Programming}, volume = {78}, number = {5}, pages = {293--303}, doi = {10.1016/j.jlap.2008.08.004}, ) @inproceedings(AppTrace, author = {Lingzhi Qiu and Zixiong Zhang and Ziyi Shen and Guozi Sun}, year = {2015}, title = {AppTrace: Dynamic trace on Android devices}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7145--7150}, doi = {10.1109/ICC.2015.7249466}, ) @article(choreo1, author = {Koushik Sen and Abhay Vardhan and Gul Agha and Ro\c{s}u, Grigore}, year = {2004}, title = {Efficient Decentralized Monitoring of Safety in Distributed Systems}, journal = {International Conference on Software Engineering}, pages = {418--427}, doi = {10.1109/ICSE.2004.1317464}, ) @inproceedings(DroidMat, author = {Dong-Jie Wu and Ching-Hao Mao and Te-En Wei and Hahn-Ming Lee and Kuo-Ping Wu}, year = {2012}, title = {DroidMat: Android Malware Detection through Manifest and API Calls Tracing}, booktitle = {Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on}, pages = {62--69}, doi = {10.1109/AsiaJCIS.2012.18}, ) @inproceedings(xu2012aurasium, author = {Rubin Xu and Hassen Sa\"{i}di and Ross Anderson}, year = {2012}, title = {Aurasium: Practical Policy Enforcement for Android Applications}, booktitle = {Proceedings of the 21st USENIX Conference on Security Symposium}, series = {Security'12}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, pages = {27--27}, doi = {10.1.1.298.9925}, url = {http://dl.acm.org/citation.cfm?id=2362793.2362820}, ) @inproceedings(choreo4, author = {Wenchao Zhou and Oleg Sokolsky and Boon Thau Loo and Insup Lee}, year = {2009}, title = {DMaC: Distributed Monitoring and Checking.}, booktitle = {Runtime Verification 09}, series = {LNCS}, volume = {5779}, publisher = {Springer}, pages = {184--201}, doi = {10.1007/978-3-642-04694-0\_13}, )