StaDynA Logo

StaDynA

0
Free
Visit Website

StaDynA is a system supporting security app analysis in the presence of dynamic code update features (dynamic class loading and reflection). Our tool combines static and dynamic analysis of Android applications in order to reveal the hidden/updated behavior and extend static analysis results with this information. This work has been done at the University of Trento. Publication: The results of our research were presented at the 5th ACM Conference on Data and Application Security and Privacy (ACM CODASPY 2015). Please use the following bibtex reference to cite our paper: @inproceedings{StaDynA_Zhauniarovich2014, author = {Zhauniarovich, Yury and Ahmad, Maqsood and Gadyatskaya, Olga and Crispo, Bruno and Massacci, Fabio}, title = {{StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications}}, booktitle = {Proceedings of the 5th ACM Conference on Data and Application Security and Privacy}, series = {CODASP

FEATURES

ALTERNATIVES

King Phisher is a phishing campaign toolkit for testing and promoting user awareness through simulated attacks.

Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.

An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.

Runtime Mobile Security (RMS) is a powerful web interface powered by FRIDA for manipulating Android and iOS Apps at Runtime.

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

A tool for analyzing Android applications in local storage with various functionalities.

Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.

Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.