Publications using this dataset

Please let us know at androzoo@uni.lu your papers that use this dataset.



Please cite this paper if you used this dataset
K. Allix, T. F. Bissyandé, J. Klein, and Y. Le Traon. AndroZoo: Collecting Millions of Android Apps for the Research Community. Mining Software Repositories (MSR) 2016. Download PDF;
See doi

@inproceedings{Allix:2016:ACM:2901739.2903508,
    author = {Allix, Kevin and Bissyand{\'e}, Tegawend{\'e} F. and Klein, Jacques and Le Traon, Yves},
    title = {AndroZoo: Collecting Millions of Android Apps for the Research Community},
    booktitle = {Proceedings of the 13th International Conference on Mining Software Repositories},
    series = {MSR '16},
    year = {2016},
    isbn = {978-1-4503-4186-8},
    location = {Austin, Texas},
    pages = {468--471},
    numpages = {4},
    url = {http://doi.acm.org/10.1145/2901739.2903508},
    doi = {10.1145/2901739.2903508},
    acmid = {2903508},
    publisher = {ACM},
    address = {New York, NY, USA},
    keywords = {APK, android applications, software repository},
}              

Li Li, J. Martinez, T. Ziadi, T. Bissyandé, J. Klein, and Y. Le Traon. Mining Families of Android Applications for Extractive SPL Adoption. In Proceedings of the International Conference on Software Product Lines, SPLC 2016.

M. Hurier, K. Allix, T. F. Bissyandé, J. Klein and Y. Le Traon. On the Lack of Consensus in Anti-Virus Decisions Metrics and Insights on Building Ground Truths of Android Malware with VirusTotal. In Proceedings of the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Spain, July 2016

Li Li, Tegawendé F. Bissyandé, Damien Octeau and Jacques Klein. DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps, International Symposium on Software Testing and Analysis (ISSTA), July 2016, Saarbrucken, Germany

K. Allix, T. F. Bissyandé, Q. Jerome, J. Klein, R. State, and Y. Le Traon. Empirical assessment of machine learning-based malware detectors for android: Measuring the gap between in-the-lab and in-the-wild validation scenarios. Empirical Software Engineering, pages 1–29, 2014.

K. Allix, T. F. Bissyandé, J. Klein, and Y. Le Traon. Are your training datasets yet relevant? an investigation into the importance of timeline in machine learning-based malware detection. In Engineering Secure Software and Systems, volume 8978 of LNCS, pages 51–67. Springer International Publishing, 2015.

K. Allix, Q. Jérome, T. F. Bissyandé, J. Klein, R. State, and Y. Le Traon. A forensic analysis of android malware: How is malware written and how it could be detected? In Computer Software and Applications Conference (COMPSAC), 2014.

G. Hecht, O. Benomar, R. Rouvoy, N. Moha, and L. Duchien. Tracking the software quality of android applications along their evolution. In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, pages 236–247, Nov 2015.

L. Li, A. Bartel, T. F. Bissyandé, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, and P. McDaniel. Iccta: Detecting inter-component privacy leaks in android apps. In Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on, volume 1, pages 280–291, May 2015.