[Soot-list] Using Soot to facilitate dynamic analysis of Android apps

Steven Arzt Steven.Arzt at cased.de
Tue Apr 8 17:22:36 EDT 2014


Hi Modhi,

 

This sounds fine – given that you are ok with missing sensitive behavior in obfuscated apps that use reflective method calls or native code. But otherwise, Soot can help you with instrumenting the logging code into the APK just as described in our tutorial.

 

Best regards,

  Steven

 

From: soot-list-bounces at CS.McGill.CA [mailto:soot-list-bounces at CS.McGill.CA] On Behalf Of Modhi Alsobiehy
Sent: Dienstag, 8. April 2014 22:21
To: soot-list at sable.mcgill.ca
Subject: [Soot-list] Using Soot to facilitate dynamic analysis of Android apps

 

Hi All,

 

I want to do a real time analysis of Android apps. to start, I need to observe the dynamic behavior of the application and log all the activities that involve requesting or sending certain information. to do that, I am thinking of following the same scheme in “Instrumenting Android” tutorial. Basically: use soot to jimplify the apk ; find the invoked expressions that involve these operations; insert some code to log them in a text file; dexify, sign and repackage.

 

Am I thinking it right? is using Soot will help accomplishing this task?

 

-Best,

modhi

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.CS.McGill.CA/pipermail/soot-list/attachments/20140408/99fcc90a/attachment.html 


More information about the Soot-list mailing list