finished, maybe, yes?
All checks were successful
/ test_checkout (push) Successful in 1m43s

This commit is contained in:
Jean-Marie 'Histausse' Mineau 2025-10-03 04:36:10 +02:00
parent 63f34abca6
commit 6a43784496
Signed by: histausse
GPG key ID: B66AEEDA9B645AD2
3 changed files with 38 additions and 22 deletions

View file

@ -1,6 +1,6 @@
#import "../lib.typ": etal
#import "../lib.typ": etal, SDKs
= Released Software <sec:soft>
= Released Software and Artifacts <sec:soft>
In @sec:rasta, we mentioned that we had some difficulties finding some software listed by Li #etal following the disappearance of the original websites hosting it.
To limit the risk of having the same issue, we hosted the different pieces of software we released for this thesis in several locations.
@ -10,12 +10,13 @@ This appendix lists the software we released as well as the different places the
The code used in @sec:rasta is available at those locations:
- The author's personal git: https://git.mineau.eu/these-android-re/rasta
- The research team Gitlab: https://gitlab.inria.fr/pirat/android/rasta
- The author's personal git: https://git.mineau.eu/these-android-re/rasta
- Github: https://github.com/histausse/rasta
- Zenodo: https://doi.org/10.5281/zenodo.10137904
The exact version of the code used in @sec:rasta is tagged as `icsr2024` in the git repositories and corresponds to the one stored in Zenodo.
The results of our experiment are also available in the Zenodo archive.
The container images used to run the different tools are available on Zenodo at https://doi.org/10.5281/zenodo.10980349 as Singularity images, and on Dockerhub under the names:
@ -38,3 +39,23 @@ The container images used to run the different tools are available on Zenodo at
- #link("https://hub.docker.com/r/histausse/rasta-redexer")[`histausse/rasta-redexer:icsr2024`]
- #link("https://hub.docker.com/r/histausse/rasta-saaf")[`histausse/rasta-saaf:icsr2024`]
- #link("https://hub.docker.com/r/histausse/rasta-wognsen")[`histausse/rasta-wognsen:icsr2024`]
== Shadow Attack Survey Dataset
The list of applications we scanned in @sec:cl, as well as the lists of platform classes, fields and, methods we extracted from the emulators for Android #SDKs 32, 33, and 34, are stored on Zenodo at https://doi.org/10.5281/zenodo.15846481.
== Theseus
The scripts we used for dynamic analysis and the code implementing the transformations described in @sec:th are available at the following locations:
- https://gitlab.inria.fr/pirat/android/android-of-theseus
- https://git.mineau.eu/these-android-re/android_of_theseus
- https://github.com/histausse/android_of_theseus
The application transformations rely on Androscalpel, the crate we developed to manipulate Dalvik bytecode.
Androscalpel can be found at the following locations:
- https://gitlab.inria.fr/pirat/android/androscalpel
- https://git.mineau.eu/these-android-re/androscalpel
- https://github.com/histausse/androscalpel