skip to main content
10.1145/2259051.2259056acmconferencesArticle/Chapter ViewAbstractPublication PagespldiConference Proceedingsconference-collections
research-article

Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot

Published:14 June 2012Publication History

ABSTRACT

This paper introduces Dexpler, a software package which converts Dalvik bytecode to Jimple. Dexpler is built on top of Dedexer and Soot. As Jimple is Soot's main internal representation of code, the Dalvik bytecode can be manipulated with any Jimple based tool, for instance for performing point-to or flow analysis.

References

  1. B. Bellamy, P. Avgustinov, O. de Moor, and D. Sereni. Efficient local type inference. In G. E. Harris, editor, OOPSLA, pages 475--492. ACM, 2008. ISBN 978-1-60558-215-3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ben Gruver, et al. Smali: An assembler/disassembler for android's dex format. http://code.google.com/p/smali/, Last accessed: March 20, 2012.Google ScholarGoogle Scholar
  3. P. Cousot and R. Cousot. An abstract interpretation-based framework for software watermarking. ACM SIGPLAN Notices, 39(1):173--185, Jan. 2004. ISSN 0362--1340 (print), 1523-2867 (print), 1558-1160 (electronic). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Dahm. Byte code engineering. In Proceedings of Java-Informations-Tage (JIT'99), pages 267--277, Düsseldorf, Deutchland, Sept. 1999. ISBN 3-540-66464-5.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Desnos and G. Gueguen. Android: From reversing to decompilation. In Blackhat, 2011.Google ScholarGoogle Scholar
  6. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, aug 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proc. USENIX Security' 11, pages 21--21, Berkeley, CA, USA, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L.-Å. Fredlund. Guaranteeing correctness properties of a java card applet. Electr. Notes Theor. Comput. Sci, 113:217--233, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. IBM. The T. J. Watson Libraries for Analysis (Wala). http://wala.sourceforge.net, Last accessed: March 20, 2012.Google ScholarGoogle Scholar
  10. Jonathan Meyer, Daniel Reynaud. Jasmin. http://jasmin.sourceforge.net.Google ScholarGoogle Scholar
  11. P. Lam, E. Bodden, O. Lhoták, and L. Hendren. The Soot framework for Java program analysis: a retrospective. In Cetus Users and Compiler Infastructure Workshop (CETUS 2011), Oct. 2011. URL http://www.bodden.de/pubs/lblh11soot.pdf.Google ScholarGoogle Scholar
  12. J. Meyer and T. Downing. Java Virtual Machine. O'Reilly, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Milner. A theory of type polymorphism in programming. JCSS, 17:348--375, 1978.Google ScholarGoogle ScholarCross RefCross Ref
  14. G. Paller. Dedexer. http://dedexer.sourceforge.net/, Last accessed: March 20, 2012.Google ScholarGoogle Scholar
  15. G. Paller. Dalvik opcodes. http://pallergabor.uw.hu/androidblog/dalvik_opcodes.html, Last accessed: March 20, 2012.Google ScholarGoogle Scholar
  16. Panxiaobo, et al. Dex2jar: Tools to work with android .dex and java .class files. http://code.google.com/p/dex2jar/, Last accessed: March 20, 2012.Google ScholarGoogle Scholar
  17. M. Schnefeld. Reconstructing dalvik applications. In CONFidence, 2009.Google ScholarGoogle Scholar
  18. M. Sosonkin, G. Naumovich, and N. Memon. Obfuscation of design intent in object-oriented applications. In M. Yung, editor, Proceedings of the 2003 ACM workshop on Digital rights management (DRM-03), pages 142--153, New York, Oct. 27 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Tiuryn. Type inference problems: A survey. In MFCS, pages 105--120, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Vallée-Rai, L. Hendren, V. Sundaresan, E. G. Patrick Lam, and P. Co. Soot - a java optimization framework. In Proceedings of CASCON 1999, pages 125--135, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Varma and S. S. Bhattacharyya. Java-through-C compilation: An enabling technology for java in embedded systems. In DATE, pages 161--167. IEEE Computer Society, 2004. ISBN 0-7695-2085-5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. E. Yahav and G. Ramalingam. Verifying safety properties using separation and heterogeneous abstractions. ACM SIGPLAN Notices, 39(6):25--34, May 2004. ISSN 0362-1340 (print), 1523-2867 (print), 1558-1160 (electronic). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Zhang, D. Yan, J. Zhao, Y. Chen, and S. Yang. BPGen: an automated breakpoint generator for debugging. In J. Kramer, J. Bishop, P. T. Devanbu, and S. Uchitel, editors, ICSE (2), pages 271--274. ACM, 2010. ISBN 978-1-60558-719-6. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SOAP '12: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis
      June 2012
      58 pages
      ISBN:9781450314909
      DOI:10.1145/2259051

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 June 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate11of11submissions,100%

      Upcoming Conference

      PLDI '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader