https://github.com/secure-software-engineering/android-instrumentation-tutorial
https://github.com/secure-software-engineering/android-instrumentation-tutorial
Last synced: 5 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/secure-software-engineering/android-instrumentation-tutorial
- Owner: secure-software-engineering
- Created: 2013-07-02T11:12:31.000Z (over 12 years ago)
- Default Branch: master
- Last Pushed: 2013-09-10T06:19:19.000Z (over 12 years ago)
- Last Synced: 2025-06-08T05:09:39.267Z (8 months ago)
- Language: Logos
- Size: 29.7 MB
- Stars: 10
- Watchers: 11
- Forks: 11
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
android-instrumentation-tutorial
================================
The VM will be provided at the workshop! You do not have to download anything in advance!
Program instrumentation is a widely used mechanism in different software engineering areas.
It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring.
This is a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two well- known monitoring
languages –Tracematches and AspectJ– can be used for instrumenting Android applications. Furthermore, we also describe the more flexible approach of manual
imperative instrumentation directly using Soot’s intermediate representation Jimple. In all three cases no source code of the target application is required.