This commit is contained in:
parent
d1dba30426
commit
471a176683
16 changed files with 181 additions and 149 deletions
|
@ -5,7 +5,7 @@
|
|||
To perform the transformations described in @sec:th-trans, we need information like the name and signature of the method called with reflection, or the actual bytecode loaded dynamically.
|
||||
We decided to collect that information through dynamic analysis.
|
||||
We saw in @sec:bg different contributions that collect this kind of information.
|
||||
In the end, we decided to keep the analysis as simple as possible, so we avoided using a custom Android build like DexHunter, and instead used Frida (see @sec:bg-frida) to instrument the application and intercept calls of the methods of interest.
|
||||
In the end, we decided to keep the analysis as simple as possible, so we avoided using a custom Android build like DexHunter, and instead used Frida to instrument the application and intercept calls of the methods of interest.
|
||||
@sec:th-fr-dcl present our approach to collect dynamically loaded bytecode, and @sec:th-fr-ref present our approach to collect the reflection data.
|
||||
Because using dynamic analysis raises the concern of coverage, we also need some interaction with the application during the analysis.
|
||||
Ideally, a reverse engineer would do the interaction.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue