[Soot-list] Intent Analysis
Steven Arzt
steven.arzt at cased.de
Wed Oct 12 05:24:36 EDT 2016
Hi Severin,
If the code is trivial, you can directly find the action strings as
constants in the respective API calls (e.g., setAction()). If this call
site only contains a local, and no constant, you might be able to use a
constant value propagation to pre-process the code. In general,
especially in the case of obfuscated apps or malware, you will, however,
have to invest more effort and go for approaches such as Harvester
(published at NDSS 1016) [1].
[1]
https://www.internetsociety.org/sites/default/files/blogs-media/harvesting-runtime-values-android-applications-feature-anti-analysis-techniques.pdf
Best regards,
Steven
On 2016-10-09 08:54, severin.zumbrunn at students.unibe.ch wrote:
> Hello,
>
> I’m a beginner with soot and I would like to know how to get the
> action name associated to an android intent in soot?
> So far, I was able to identify all calls containing intents in the
> app, but I don’t know how to get such values.
>
> Thanks,
> Severin
> _______________________________________________
> Soot-list mailing list
> Soot-list at CS.McGill.CA
> https://mailman.CS.McGill.CA/mailman/listinfo/soot-list
More information about the Soot-list
mailing list