DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection

SpringerLink

A static and dynamic analysis tool for Android malware detection. Please cite the paper below if you use this tool:

  • Muzaffar, A., Ragab Hassen, H., Zantout, H., & Lones, M. A. (2023, April). DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection. In International Conference on Applied CyberSecurity (pp. 3-9). Cham: Springer Nature Switzerland.

Installing Python Dependencies

pip install -r requirements_static.txt
pip install -r requirements_dynamic.txt

Dynamic Analysis

  • Emulator has root access.
  • Emulator is connected to your network and adb.
  • Copy the FRIDA server file in api_calls folder to the emulator in this location: /data/local/tmp/.
  • Create a snapshot of the emulator image. This image will be used to run dynamic analysis on each application.

.env

APK_FOLDER=
ANALYSIS_OUTPUT=
OPCODES_OUTPUT=
CFG_OUTPUT=
ANDROID_PLATFORMS=
AVD_NAME=
SNAPSHOT_NAME=
DYNAMIC_OUTPUT=
MONKEY_EVENTS= 
DYNAMIC_LOG=

Usage

Static analysis:

python static_analysis.py

Dynamic analysis:

python dynamic analysis.py