StaDynA is a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). Our tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information. This work has been done at the University of Trento. Publication: The results of our research were presented at the 5th ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2015). Please use the following bibtex reference to cite our paper: @inproceedings{StaDynA_Zhauniarovich2014, author = {Zhauniarovich, Yury and Ahmad, Maqsood and Gadyatskaya, Olga and Crispo, Bruno and Massacci, Fabio}, title = {{StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications}}, booktitle = {Proceedings of the 5th ACM Conference on Data and Application Security and Privacy}, series = {CODASP
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
Python tool for monitoring user-select APIs in Android apps using Frida.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.
Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Extract local data storage of an Android application in one click.
A command line steganography tool that uses LSB technique to hide files within images without visible alteration.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.