Skip to content

SaitoLab-Nitech/ATATechniques

Repository files navigation

ATATechniques

This is a test suite with anti-taint-analysis techniques discussed in our paper at ARES 2021. Also, our journal paper has been published in August 2022, and we released another test suite used in the paper at ATATechniques_SuspiciousValidationDetection.

When you reference this work, please cite our paper by one of the following:

Setup

This is a project created with Android Studio. Please set up the latest version of Android Studio on your machine.

Usage

  1. Open this project with Android Studio
  2. Set your IP address and port number into variables in MainActivity.java
    • Set IP address in hostIPAddr (default is "0.0.0.0")
    • Set port number in hostPort (default is 9000)
  3. In MainActivity.java, choose one of ata techniques by uncommenting one of lines starting with srcUntainted =
    • By default, srcUntainted = testTechnique(srcTainted); is active
  4. Execute it on an Android device by clicking "Run" on Android Studio
    • You should grant app the permission READ_PHONE_STATE for accessing IMEI
    • We have tested apps on Nexus 4 with TaintDroid (4.3r1) and Zenfone 4 (Android 8.0.0)

References

  • AntiTaintDroid
    • As our paper explains, our test suite is based on AntiTaintDroid, and most of the techniques here are combinations of techniques from AntiTaintDroid.
  • TaintDroid

About

Test suite with anti-taint-analysis techniques

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages