Skip to content
No description, website, or topics provided.
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.


DIALDroid is a highly scalable tool to identify inter-app collusions and privilege escalations among Android apps.


  1. Please download or clone this repository.
  2. You can directly use the standalone Jar file (dialdroid.jar) inside the build directory. Or you can build using ant (ant ).
  3. To run DIALDroid you will need android platform files. You can get a collection here:
  4. DIALDroid stores results in a MySQL database. The database schema is here:
  5. Please modify the file inside the build directory to provide database username and password. Please note the the file, ic3-android.jar, AndroidCallbacks.txt, and EasyTaintWrappersSource.txt must be in the same directory as the dialdroid.jar.
  6. The easy way would be to use script. Edit the file and modify the database_name and classpath. At least 32GB memory is recommended to run dialdroid. You can customize the memory in the (-Xms16G -Xmx64G).
  7. takes two arguments. The first argument is the name of the apk file and second argument is the category of the app (e.g., Games, Social, Business). : ./ directory_containing_apks SOCIAL
  8. dialdroid will analyze the apps one by one and finally compute the sensitive channels (ICC links that can potentially carry sensitive information) and store those in the table named SensitiveChannels.
  9. Use following MySQL query to compute ICC-based leaks:
  10. Use following MySQL query to compute privilege escalations:


If you encounter any issues in running DIALDroid, please post it in the issues tab. Alternatively, you can also contact Dr. Amiangshu Bosu [abosu at cs dot siu dot edu].

You can’t perform that action at this time.