LibD: Scalable and Precise Third-party Library Detection in Android Markets
☆66May 6, 2019Updated 6 years ago
Alternatives and similar repositories for libd
Users that are interested in libd are comparing it to the libraries listed below
Sorting:
- an obfuscation-resilient, highly precise and reliable library detector for Android applications☆52Sep 13, 2018Updated 7 years ago
- Android third-party library Detection☆17Mar 7, 2020Updated 5 years ago
- LibScout: Third-party library detector for Java/Android apps☆307Oct 25, 2019Updated 6 years ago
- LibRadar - A detecting tool for 3rd-party libraries in Android apps.☆277May 26, 2020Updated 5 years ago
- Mining API-Level Features for Robust Malware Detection in Android☆24Jan 10, 2018Updated 8 years ago
- Research papers and tools on Android☆129Feb 24, 2021Updated 5 years ago
- ☆18Apr 17, 2018Updated 7 years ago
- ☆29Jul 6, 2023Updated 2 years ago
- ☆44Oct 15, 2020Updated 5 years ago
- The dataset used in the experiments for Esh (http://binsim.com)☆21Sep 8, 2016Updated 9 years ago
- ☆18Apr 27, 2018Updated 7 years ago
- ☆22Feb 14, 2017Updated 9 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Jul 4, 2019Updated 6 years ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆127Dec 27, 2022Updated 3 years ago
- A repository of Android common libraries and advertisement libraries☆32Sep 15, 2018Updated 7 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19May 21, 2015Updated 10 years ago
- ☆24Jun 10, 2023Updated 2 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Security methods for WeAkNess detection☆20Jan 26, 2026Updated last month
- FOCUS is a context-aware collaborative-filtering system that exploits cross relationships among OSS projects to suggest the inclusion of …☆21Jun 14, 2023Updated 2 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- IC3: Inter-Component Communication Analysis in Android☆41Feb 6, 2020Updated 6 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆86Mar 7, 2016Updated 9 years ago
- A targeted input generator for Android that improves the effectiveness of dynamic malware analysis.☆59Jun 20, 2018Updated 7 years ago
- ☆22Nov 16, 2023Updated 2 years ago
- ☆12May 6, 2020Updated 5 years ago
- afl源码分析☆13Aug 9, 2018Updated 7 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- Drebin - NDSS 2014 Re-implementation☆106Dec 20, 2017Updated 8 years ago
- ReDeBug Source Code.☆24Dec 12, 2023Updated 2 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- The central ASPIRE framework repository, start here if you want to use our tools (this contains all tools and documentation)☆13Apr 17, 2021Updated 4 years ago
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- Conv Net for identifying GUI componenets from screenshots using Tensorflow☆12Mar 24, 2023Updated 2 years ago
- This is the code for the Pluto framework to assess data exposure by an Android app to an advertising library. The framework was presented…☆13Jan 23, 2018Updated 8 years ago