8000 GitHub - Knowlng/SuS: Android Application Vulnerability Analyser
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Knowlng/SuS

 
 

Repository files navigation

SuS - Securing user Software

Cross-platform static analysis software for analyzing Android Applications

This project was successfully completed through team collaboration during the Project-Based Learning course at Vilnius University.

Team members:

Čepulis Nerijus

Kabišaitytė Evelina

Maciūnas Adrijanas Juozas

Petkevičius Lukas

Project vision

Our goal is to create a versatile tool for in-depth analysis of Android applications. This software is designed decompile APK files from the Android store, enabling users to conduct thorough investigations into their Java code. Key features include the ability to detect and analyze potentially dangerous code patterns, which are identified based on a specific method, that rewrites dangerous patterns as a list of dangerous patterns detectors.

The analysis results are then articulated in a detailed PDF report. This report includes not only textual information but also graphical representations of dangerous patterns as well as code snippets from our pattern investigation.

Our vision is to empower both experienced and novice users with a robust, user-friendly tool that makes the complex task of static analysis more approachable and effective, contributing to safer Android application development and usage.

Project Documentation

Table of Contents

Development dependencies

These dependencies are automatically included in our program

Runtime dependencies

For dataflow graph generation this dependancy should be installed:

Building the program

Java version 19 or newer is needed to compile this program!

Compile the program using gradle wrapper

On Linux, MacOS & Windows versions that support shell scripts

./gradlew build

On windows

gradlew.bat build

You can found generated JAR executable inside /build/libs/ directory

Run the generated JAR file

java -jar build/libs/sus.jar

Please make sure to also keep the /tools folder in the root folder of the project!

Showcase of Analytical Findings Stored in a PDF

Example of analysis summmary inside PDF Project Flowchart

Example of found permissions list inside PDF Project Flowchart

Example of found dangerous pattern Inside PDF Project Flowchart

About

Android Application Vulnerability Analyser

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Java 87.9%
  • Shell 7.7%
  • Batchfile 4.4%
0