This commit is contained in:
parent
63f34abca6
commit
6a43784496
3 changed files with 38 additions and 22 deletions
|
@ -1,6 +1,6 @@
|
|||
#import "../lib.typ": etal
|
||||
#import "../lib.typ": etal, SDKs
|
||||
|
||||
= Released Software <sec:soft>
|
||||
= Released Software and Artifacts <sec:soft>
|
||||
|
||||
In @sec:rasta, we mentioned that we had some difficulties finding some software listed by Li #etal following the disappearance of the original websites hosting it.
|
||||
To limit the risk of having the same issue, we hosted the different pieces of software we released for this thesis in several locations.
|
||||
|
@ -10,12 +10,13 @@ This appendix lists the software we released as well as the different places the
|
|||
|
||||
The code used in @sec:rasta is available at those locations:
|
||||
|
||||
- The author's personal git: https://git.mineau.eu/these-android-re/rasta
|
||||
- The research team Gitlab: https://gitlab.inria.fr/pirat/android/rasta
|
||||
- The author's personal git: https://git.mineau.eu/these-android-re/rasta
|
||||
- Github: https://github.com/histausse/rasta
|
||||
- Zenodo: https://doi.org/10.5281/zenodo.10137904
|
||||
|
||||
The exact version of the code used in @sec:rasta is tagged as `icsr2024` in the git repositories and corresponds to the one stored in Zenodo.
|
||||
The results of our experiment are also available in the Zenodo archive.
|
||||
|
||||
The container images used to run the different tools are available on Zenodo at https://doi.org/10.5281/zenodo.10980349 as Singularity images, and on Dockerhub under the names:
|
||||
|
||||
|
@ -38,3 +39,23 @@ The container images used to run the different tools are available on Zenodo at
|
|||
- #link("https://hub.docker.com/r/histausse/rasta-redexer")[`histausse/rasta-redexer:icsr2024`]
|
||||
- #link("https://hub.docker.com/r/histausse/rasta-saaf")[`histausse/rasta-saaf:icsr2024`]
|
||||
- #link("https://hub.docker.com/r/histausse/rasta-wognsen")[`histausse/rasta-wognsen:icsr2024`]
|
||||
|
||||
== Shadow Attack Survey Dataset
|
||||
|
||||
The list of applications we scanned in @sec:cl, as well as the lists of platform classes, fields and, methods we extracted from the emulators for Android #SDKs 32, 33, and 34, are stored on Zenodo at https://doi.org/10.5281/zenodo.15846481.
|
||||
|
||||
== Theseus
|
||||
|
||||
The scripts we used for dynamic analysis and the code implementing the transformations described in @sec:th are available at the following locations:
|
||||
|
||||
- https://gitlab.inria.fr/pirat/android/android-of-theseus
|
||||
- https://git.mineau.eu/these-android-re/android_of_theseus
|
||||
- https://github.com/histausse/android_of_theseus
|
||||
|
||||
The application transformations rely on Androscalpel, the crate we developed to manipulate Dalvik bytecode.
|
||||
Androscalpel can be found at the following locations:
|
||||
|
||||
- https://gitlab.inria.fr/pirat/android/androscalpel
|
||||
- https://git.mineau.eu/these-android-re/androscalpel
|
||||
- https://github.com/histausse/androscalpel
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue