#import "../lib.typ": etal, SDKs = Released Software and Artifacts In @sec:rasta, we mentioned that we had some difficulties finding some software listed by Li #etal following the disappearance of the original websites hosting it. To limit the risk of having the same issue, we hosted the different pieces of software we released for this thesis in several locations. This appendix lists the software we released as well as the different places they can be found. == RASTA The code used in @sec:rasta is available at those locations: - The research team Gitlab: https://gitlab.inria.fr/pirat/android/rasta - The author's personal git: https://git.mineau.eu/these-android-re/rasta - Github: https://github.com/histausse/rasta - Zenodo: https://doi.org/10.5281/zenodo.10137904 The exact version of the code used in @sec:rasta is tagged as `icsr2024` in the git repositories and corresponds to the one stored in Zenodo. The results of our experiment are also available in the Zenodo archive. The container images used to run the different tools are available on Zenodo at https://doi.org/10.5281/zenodo.10980349 as Singularity images, and on Dockerhub under the names: - #link("https://hub.docker.com/r/histausse/rasta-adagio")[`histausse/rasta-adagio:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-amandroid")[`histausse/rasta-amandroid:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-anadroid")[`histausse/rasta-anadroid:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-androguard-dad")[`histausse/rasta-androguard-dad:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-androguard")[`histausse/rasta-androguard:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-apparecium")[`histausse/rasta-apparecium:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-blueseal")[`histausse/rasta-blueseal:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-dialdroid")[`histausse/rasta-dialdroid:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-didfail")[`histausse/rasta-didfail:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-droidsafe")[`histausse/rasta-droidsafe:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-flowdroid")[`histausse/rasta-flowdroid:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-gator")[`histausse/rasta-gator:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-ic3-fork")[`histausse/rasta-ic3-fork:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-ic3")[`histausse/rasta-ic3:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-iccta")[`histausse/rasta-iccta:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-mallodroid")[`histausse/rasta-mallodroid:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-redexer")[`histausse/rasta-redexer:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-saaf")[`histausse/rasta-saaf:icsr2024`] - #link("https://hub.docker.com/r/histausse/rasta-wognsen")[`histausse/rasta-wognsen:icsr2024`] == Shadow Attack Survey Dataset The list of applications we scanned in @sec:cl, as well as the lists of platform classes, fields and, methods we extracted from the emulators for Android #SDKs 32, 33, and 34, are stored on Zenodo at https://doi.org/10.5281/zenodo.15846481. #jfl-note[Et le dataset utilsé pour évaluer les outils?] == Theseus The scripts we used for dynamic analysis and the code implementing the transformations described in @sec:th are available at the following locations: #jfl-note[Ajouter les licences] - https://gitlab.inria.fr/pirat/android/android-of-theseus - https://git.mineau.eu/these-android-re/android_of_theseus - https://github.com/histausse/android_of_theseus The application transformations rely on Androscalpel, the crate we developed to manipulate Dalvik bytecode. Androscalpel can be found at the following locations: - https://gitlab.inria.fr/pirat/android/androscalpel - https://git.mineau.eu/these-android-re/androscalpel - https://github.com/histausse/androscalpel #jfl-note[ Et le dataset? ]