San Francisco ZTE Blade Mobile Phone.
http://www.gsmarena.com/zte_blade-3391.php , [Online; accessed 30-April-2015].
Study for insight on Mobile Device Usage.
https://s3-ap-southeast-1.amazonaws.com/tap-sg-media/theAsianparent+Insights+Device+Usage+A+Southeast+Asia+Study+November+2014.pdf , [Online; accessed 25-March-2015].
Cyrille Artho, Howard Barringer, Allen Goldberg, Klaus Havelund, Sarfraz Khurshid, Mike Lowry, Corina Pasareanu, Grigore Roşu, Koushik Sen & Willem Visser (2005):
Combining test case generation and runtime verification.
Theoretical Computer Science 336(2),
pp. 209–234,
doi:10.1016/j.tcs.2004.11.007.
Fabio Barbon, Paolo Traverso, Marco Pistore & Michele Trainotti (2006):
Run-Time Monitoring of Instances and Classes of Web Service Compositions.
In: ICWS '06: Proceedings of the IEEE International Conference on Web Services.
IEEE Computer Society,
Washington, DC, USA,
pp. 63–71,
doi:10.1109/ICWS.2006.113.
Andreas Bauer, Jan-Christoph Küster & Gil Vegliach (2012):
Runtime Verification meets Android Security.
In: Proceedings of the 4th NASA Formal Methods Symposium (NFM),
LNCS 7226.
Springer,
pp. 174–180,
doi:10.1007/978-3-642-28891-3_18.
Christian Colombo, Adrian Francalanza, Ruth Mizzi & Gordon J Pace (2012):
polylarva: Runtime verification with configurable resource-aware monitoring boundaries.
In: Software Engineering and Formal Methods.
Springer,
pp. 218–232,
doi:10.1007/978-3-642-33826-7_15.
Thomas S. Cook, Doron Drusinksy & Man-Tak Shing (2007):
Specification, Validation and Run-time Moniroting of SOA Based System-of Systems Temporal Behaviors.
In: System of Systems Engineering (SoSE).
IEEE Computer Society,
doi:10.1109/SYSOSE.2007.4304313.
Marcelo d'Amorim & Klaus Havelund (2005):
Event-based runtime verification of Java programs.
In: ACM SIGSOFT Software Engineering Notes 30.
ACM,
pp. 1–7,
doi:10.1007/978-3-642-03240-0_13.
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel & Anmol N. Sheth (2010):
TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones.
In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation,
OSDI'10.
USENIX Association,
Berkeley, CA, USA,
pp. 1–6,
doi:10.1.1.179.3303.
Available at http://dl.acm.org/citation.cfm?id=1924943.1924971.
Yliès Falcone, Sebastian Currea & Mohamad Jaber (2013):
Runtime Verification and Enforcement for Android Applications with RV-Droid.
In: Shaz Qadeer & Serdar Tasiran: Runtime Verification,
Lecture Notes in Computer Science 7687.
Springer Berlin Heidelberg,
pp. 88–95,
doi:10.1007/978-3-642-35632-2_11.
Yliès Falcone, Sebastian Currea & Mohamad Jaber (2013):
Runtime Verification and Enforcement for Android Applications with RV-Droid.
In: Shaz Qadeer & Serdar Tasiran: Runtime Verification,
Lecture Notes in Computer Science 7687.
Springer Berlin Heidelberg,
pp. 88–95,
doi:10.1007/978-3-642-35632-2_11.
Martin Leucker & Christian Schallhart (2009):
A brief account of runtime verification.
The Journal of Logic and Algebraic Programming 78(5),
pp. 293–303,
doi:10.1016/j.jlap.2008.08.004.
Lingzhi Qiu, Zixiong Zhang, Ziyi Shen & Guozi Sun (2015):
AppTrace: Dynamic trace on Android devices.
In: 2015 IEEE International Conference on Communications, ICC 2015, London, United Kingdom, June 8-12, 2015,
pp. 7145–7150,
doi:10.1109/ICC.2015.7249466.
Koushik Sen, Abhay Vardhan, Gul Agha & Grigore Roşu (2004):
Efficient Decentralized Monitoring of Safety in Distributed Systems.
International Conference on Software Engineering,
pp. 418–427,
doi:10.1109/ICSE.2004.1317464.
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee & Kuo-Ping Wu (2012):
DroidMat: Android Malware Detection through Manifest and API Calls Tracing.
In: Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on,
pp. 62–69,
doi:10.1109/AsiaJCIS.2012.18.
Rubin Xu, Hassen Saïdi & Ross Anderson (2012):
Aurasium: Practical Policy Enforcement for Android Applications.
In: Proceedings of the 21st USENIX Conference on Security Symposium,
Security'12.
USENIX Association,
Berkeley, CA, USA,
pp. 27–27,
doi:10.1.1.298.9925.
Available at http://dl.acm.org/citation.cfm?id=2362793.2362820.
Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo & Insup Lee (2009):
DMaC: Distributed Monitoring and Checking..
In: Runtime Verification 09,
LNCS 5779.
Springer,
pp. 184–201,
doi:10.1007/978-3-642-04694-0_13.