wyf295 / LibScanLinks
☆24Updated 2 years ago
Alternatives and similar repositories for LibScan
Users that are interested in LibScan are comparing it to the libraries listed below
Sorting:
- ☆23Updated 2 years ago
- ICCBot: A Fragment-Aware and Context-Sensitive ICC Resolution Tool for Android Applications☆43Updated 2 years ago
- LibD: Scalable and Precise Third-party Library Detection in Android Markets☆66Updated 6 years ago
- ☆15Updated 3 years ago
- ☆29Updated 2 years ago
- an obfuscation-resilient, highly precise and reliable library detector for Android applications☆52Updated 7 years ago
- Orlis/Orcis☆21Updated 7 years ago
- Mobile App Analysis and Testing Literature☆105Updated 2 months ago
- Fair Android Explorer☆22Updated 2 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Updated 3 years ago
- Project FlowCog (2017)☆27Updated 7 years ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆12Updated last year
- 使用Soot进行android应用静态分析☆67Updated 7 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆55Updated 2 years ago
- Automated Storyboard Generation for Android Apps☆35Updated last year
- Source code of PurPliance analysis tool.☆18Updated last year
- A micro-benchmark suite to assess the stability of taint-analysis tools for Android☆293Updated 6 months ago
- A search-based Android static analysis tool with much better performance than Amandroid and FlowDroid☆50Updated 4 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆15Updated last year
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated last year
- Flow analysis using Soot☆52Updated 5 years ago
- Benchmark apps for static analyzing inter-component data leakage problem of Android apps.☆18Updated 8 years ago
- Inter-component communication Taint Analysis for Android☆94Updated 9 years ago
- IC3: Inter-Component Communication Analysis in Android☆41Updated 6 years ago
- Extract call graph from apks using Flowdroid.☆20Updated 5 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- ☆16Updated 5 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 3 years ago
- ☆102Updated last year