ucsb-seclab / android_ui_deceptionLinks
Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper
☆19Updated 10 years ago
Alternatives and similar repositories for android_ui_deception
Users that are interested in android_ui_deception are comparing it to the libraries listed below
Sorting:
- Android File Fuzzing Framework☆86Updated 2 years ago
- JNI method enumeration in ELF files☆50Updated 9 years ago
- ☆34Updated 8 years ago
- Broadcast Intent FUZzing Framework for Android☆80Updated 9 years ago
- ☆27Updated 9 years ago
- slide and full exploit☆86Updated 4 years ago
- An Android port of radamsa fuzzer☆66Updated 5 years ago
- Control Flow Graph Scanning for Android☆59Updated 10 years ago
- Marvin static analyzer is an Android application vulnerability scanner. The framework uses androguard and Static Android Analysis Framewo…☆68Updated 6 years ago
- SEAndroid Analytics Library for live device analysis☆59Updated 6 years ago
- ☆91Updated 8 years ago
- ☆33Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- The Static Android Analysis Framework.☆39Updated 9 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated 2 years ago
- Symbolic/concolic execution of Android apps☆56Updated 9 years ago
- Example queries for joern☆18Updated 8 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Fuzzing Harness for Firefox Mobile on Android☆40Updated 6 years ago
- Python concolic execution framework for program analysis☆66Updated 10 years ago
- ☆23Updated 9 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆81Updated 8 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- ☆16Updated 9 years ago
- ☆23Updated 10 years ago
- Symbolic Execution of Android Framework☆15Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago