References

  1. CyanogenMod. http://www.cyanogenmod.org/ , [Online; accessed 30-April-2015].
  2. San Francisco ZTE Blade Mobile Phone. http://www.gsmarena.com/zte_blade-3391.php , [Online; accessed 30-April-2015].
  3. Study for insight on Mobile Device Usage. https://s3-ap-southeast-1.amazonaws.com/tap-sg-media/theAsianparent+Insights+Device+Usage+A+Southeast+Asia+Study+November+2014.pdf , [Online; accessed 25-March-2015].
  4. Cyrille Artho, Howard Barringer, Allen Goldberg, Klaus Havelund, Sarfraz Khurshid, Mike Lowry, Corina Pasareanu, Grigore Roşu, Koushik Sen & Willem Visser (2005): Combining test case generation and runtime verification. Theoretical Computer Science 336(2), pp. 209–234, doi:10.1016/j.tcs.2004.11.007.
  5. Fabio Barbon, Paolo Traverso, Marco Pistore & Michele Trainotti (2006): Run-Time Monitoring of Instances and Classes of Web Service Compositions. In: ICWS '06: Proceedings of the IEEE International Conference on Web Services. IEEE Computer Society, Washington, DC, USA, pp. 63–71, doi:10.1109/ICWS.2006.113.
  6. Andreas Bauer, Jan-Christoph Küster & Gil Vegliach (2012): Runtime Verification meets Android Security. In: Proceedings of the 4th NASA Formal Methods Symposium (NFM), LNCS 7226. Springer, pp. 174–180, doi:10.1007/978-3-642-28891-3_18.
  7. Christian Colombo, Adrian Francalanza, Ruth Mizzi & Gordon J Pace (2012): polylarva: Runtime verification with configurable resource-aware monitoring boundaries. In: Software Engineering and Formal Methods. Springer, pp. 218–232, doi:10.1007/978-3-642-33826-7_15.
  8. Thomas S. Cook, Doron Drusinksy & Man-Tak Shing (2007): Specification, Validation and Run-time Moniroting of SOA Based System-of Systems Temporal Behaviors. In: System of Systems Engineering (SoSE). IEEE Computer Society, doi:10.1109/SYSOSE.2007.4304313.
  9. Marcelo d'Amorim & Klaus Havelund (2005): Event-based runtime verification of Java programs. In: ACM SIGSOFT Software Engineering Notes 30. ACM, pp. 1–7, doi:10.1007/978-3-642-03240-0_13.
  10. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel & Anmol N. Sheth (2010): TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10. USENIX Association, Berkeley, CA, USA, pp. 1–6, doi:10.1.1.179.3303. Available at http://dl.acm.org/citation.cfm?id=1924943.1924971.
  11. Yliès Falcone, Sebastian Currea & Mohamad Jaber (2013): Runtime Verification and Enforcement for Android Applications with RV-Droid. In: Shaz Qadeer & Serdar Tasiran: Runtime Verification, Lecture Notes in Computer Science 7687. Springer Berlin Heidelberg, pp. 88–95, doi:10.1007/978-3-642-35632-2_11.
  12. Yliès Falcone, Sebastian Currea & Mohamad Jaber (2013): Runtime Verification and Enforcement for Android Applications with RV-Droid. In: Shaz Qadeer & Serdar Tasiran: Runtime Verification, Lecture Notes in Computer Science 7687. Springer Berlin Heidelberg, pp. 88–95, doi:10.1007/978-3-642-35632-2_11.
  13. Adrian Francalanza, Andrew Gauci & Gordon J. Pace (2013): Distributed system contract monitoring. The Journal of Logic and Algebraic Programming 82(5-7), pp. 186–215, doi:10.1016/j.jlap.2013.04.001. Available at http://www.sciencedirect.com/science/article/pii/S1567832613000234. Formal Languages and Analysis of Contract-Oriented Software (FLACOS'11).
  14. Hendra Gunadi & Alwen Tiu (2013): Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating System.. CoRR abs/1311.2362, doi:10.1007/978-3-319-06410-9_21. Available at http://dblp.uni-trier.de/db/journals/corr/corr1311.html#GunadiT13.
  15. Martin Leucker & Christian Schallhart (2009): A brief account of runtime verification. The Journal of Logic and Algebraic Programming 78(5), pp. 293–303, doi:10.1016/j.jlap.2008.08.004.
  16. Lingzhi Qiu, Zixiong Zhang, Ziyi Shen & Guozi Sun (2015): AppTrace: Dynamic trace on Android devices. In: 2015 IEEE International Conference on Communications, ICC 2015, London, United Kingdom, June 8-12, 2015, pp. 7145–7150, doi:10.1109/ICC.2015.7249466.
  17. Koushik Sen, Abhay Vardhan, Gul Agha & Grigore Roşu (2004): Efficient Decentralized Monitoring of Safety in Distributed Systems. International Conference on Software Engineering, pp. 418–427, doi:10.1109/ICSE.2004.1317464.
  18. Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee & Kuo-Ping Wu (2012): DroidMat: Android Malware Detection through Manifest and API Calls Tracing. In: Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on, pp. 62–69, doi:10.1109/AsiaJCIS.2012.18.
  19. Rubin Xu, Hassen Saïdi & Ross Anderson (2012): Aurasium: Practical Policy Enforcement for Android Applications. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security'12. USENIX Association, Berkeley, CA, USA, pp. 27–27, doi:10.1.1.298.9925. Available at http://dl.acm.org/citation.cfm?id=2362793.2362820.
  20. Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo & Insup Lee (2009): DMaC: Distributed Monitoring and Checking.. In: Runtime Verification 09, LNCS 5779. Springer, pp. 184–201, doi:10.1007/978-3-642-04694-0_13.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org