Paper: https://haehyun.github.io/papers/dexMon-access18.pdf
- This repository contains DexMonitor modified Dalvik VM a.k.a AndroMon.
- You can trace dalvik bytecode and extract dynamically loaded executables.
- For more details, please refere to the paper.
@article{dexmon2018cho,
title = {{DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications}},
author = {Haehyun Cho, Jeong Hyun Yi, and Gail-Joon Ahn},
journal = {IEEE Access},
volume = {6},
pages = {71229--71240},
year = 2018,
publisher = {IEEE}
}
- Under GPLv2.
- Copyrights are specificed under LICENSE.
- Haehyun Cho [email protected]