/dexMon

Primary LanguageC++

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

Paper: https://haehyun.github.io/papers/dexMon-access18.pdf

Summary

  • This repository contains DexMonitor modified Dalvik VM a.k.a AndroMon.
  • You can trace dalvik bytecode and extract dynamically loaded executables.
  • For more details, please refere to the paper.

Publication

@article{dexmon2018cho,
 	title     = {{DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications}},
 	author    = {Haehyun Cho, Jeong Hyun Yi, and Gail-Joon Ahn},
 	journal   = {IEEE Access},
	volume    = {6},
	pages     = {71229--71240},
	year      = 2018,
	publisher = {IEEE}
}

License

  • Under GPLv2.
  • Copyrights are specificed under LICENSE.

Contact