A static and dynamic analysis tool for Android malware detection. Please cite the paper below if you use this tool:
- Muzaffar, A., Ragab Hassen, H., Zantout, H., & Lones, M. A. (2023, April). DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection. In International Conference on Applied CyberSecurity (pp. 3-9). Cham: Springer Nature Switzerland.
pip install -r requirements_static.txt
pip install -r requirements_dynamic.txt
- Emulator has root access.
- Emulator is connected to your network and adb.
- Copy the FRIDA server file in
api_calls
folder to the emulator in this location:/data/local/tmp/
. - Create a snapshot of the emulator image. This image will be used to run dynamic analysis on each application.
APK_FOLDER=
ANALYSIS_OUTPUT=
OPCODES_OUTPUT=
CFG_OUTPUT=
ANDROID_PLATFORMS=
AVD_NAME=
SNAPSHOT_NAME=
DYNAMIC_OUTPUT=
MONKEY_EVENTS=
DYNAMIC_LOG=
Static analysis:
python static_analysis.py
Dynamic analysis:
python dynamic analysis.py