SQUARE-RG / ICCBot
ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications
☆38Updated last year
Alternatives and similar repositories for ICCBot:
Users that are interested in ICCBot are comparing it to the libraries listed below
- ☆23Updated last year
- Fair Android Explorer☆21Updated last year
- Automated Storyboard Generation for Android Apps☆32Updated 5 months ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆48Updated 3 years ago
- ☆8Updated 6 months ago
- ☆15Updated 3 years ago
- IC3: Inter-Component Communication Analysis in Android☆37Updated 5 years ago
- ☆10Updated 3 years ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated 5 months ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆67Updated 5 years ago
- 使用Soot进行android应用静态分析☆67Updated 6 years ago
- Flow analysis using Soot☆51Updated 4 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- ☆20Updated last year
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆38Updated 2 years ago
- ☆29Updated last year
- Extract call graph from apks using Flowdroid.☆19Updated 4 years ago
- AndroidSlicer is a dynamic slicing tool, useful for a variety of tasks, from testing to debugging to security.☆13Updated 5 years ago
- Mobile App Analysis and Testing Literature☆85Updated last month
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- Inter-component communication Taint Analysis for Android☆92Updated 9 years ago
- ☆20Updated 3 years ago
- A tool to instrument Android APKs based on Soot☆15Updated 4 years ago
- Orlis/Orcis☆21Updated 6 years ago
- ☆16Updated 4 years ago
- an obfuscation-resilient, highly precise and reliable library detector for Android applications☆52Updated 6 years ago
- Time-travel Testing☆105Updated 2 years ago
- ☆10Updated 2 years ago
- PScout Android permission mappings☆27Updated 3 years ago
- ☆12Updated last year