Android has become the most popular operating system for Smartphone, which renders it as an attractive target for malwares. Several techniques from literature have been developed to protect sensitive information of users from being stolen. Unfortunately, until now these techniques are not sufficient and therefore need to be improved. These techniques mainly use some tools already developed to disassemble or to study behavior of malicious programs. Additionally, there exist integrated environments that people use to perform isolated analysis in virtual machine.