diff --git a/X_appendices/released_software.typ b/X_appendices/released_software.typ index 22bb1cf..b9a59d1 100644 --- a/X_appendices/released_software.typ +++ b/X_appendices/released_software.typ @@ -46,6 +46,12 @@ The container images used to run the different tools are available on Zenodo at The list of applications we scanned in @sec:cl, as well as the lists of platform classes, fields and, methods we extracted from the emulators for Android #SDKs 32, 33, and 34, are stored on Zenodo at https://doi.org/10.5281/zenodo.15846481. +The experiment we used to survey in-the-wild applications is available here: + +- https://gitlab.inria.fr/pirat-public/android/android_class_shadowing_scanner +- https://git.mineau.eu/these-android-re/android_class_shadowing_scanner +- https://github.com/histausse/android_class_shadowing_scanner + == Theseus The scripts we used for dynamic analysis and the code implementing the transformations described in @sec:th are available at the following locations under GPL license: