tjusenchen / StoryDroidLinks
Automated Storyboard Generation for Android Apps
☆35Updated last year
Alternatives and similar repositories for StoryDroid
Users that are interested in StoryDroid are comparing it to the libraries listed below
Sorting:
- Automated Accessibility Issue Detection for Android Apps☆25Updated last year
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆43Updated last year
- Mobile App Analysis and Testing Literature☆103Updated last month
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Updated 3 years ago
- ☆15Updated 3 years ago
- ☆24Updated 2 years ago
- Fair Android Explorer☆22Updated 2 years ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated last year
- Stoat (STochastic model App Tester) - an automatic testing tool for android apps☆153Updated 2 years ago
- ☆11Updated 8 years ago
- ☆26Updated 2 weeks ago
- ☆59Updated 2 years ago
- ☆29Updated 2 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆55Updated 2 years ago
- Flow analysis using Soot☆52Updated 5 years ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆66Updated 6 years ago
- The Themis Benchmark for evaluating automated GUI testing☆158Updated 2 years ago
- ☆11Updated last year
- ☆102Updated last year
- ☆23Updated 2 years ago
- This repository is to support contributions for tools and new data entries for the D2A dataset hosted in DAX☆73Updated 3 years ago
- Orlis/Orcis☆21Updated 7 years ago
- DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network☆114Updated 3 years ago
- ☆56Updated 4 years ago
- A tool to instrument Android APKs based on Soot☆15Updated 5 years ago
- A step-by-step tutorial for Soot (a Java static analysis framework)☆447Updated 3 years ago
- Benchmark apps for static analyzing inter-component data leakage problem of Android apps.☆18Updated 8 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆129Updated 2 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Updated 3 years ago