This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


External Dataset
External Data Source
Xi'an Jiaotong University
55 (lowest rank is 55)

Category & Restrictions

application layer security, cyber defense, wireless, network data, mobile software


SandDroid is an automatic Android application analysis system

Features of SandDroid:

Static Analysis:
Basic Information Extraction: file size, file hash, package name, SDK version, etc
Certification Analysis: Parse the certification and check if it's from AOSP.
Category Analysis: Classify the APK to different categories based on the permission information
Permission Analysis: Extract permissions (include customized permissions) and detect if the declared permission is used
Component Analysis: List all the components (include dynamically registered broadcast receivers) and analyze if the component is exported
Code Feature Analysis: Check native code, java reflection, dynamic loader usage
Advertisement Module Analysis: Extract all the advertisement modules
Sensitive API Analysis: List all the sensitive APIs and the caller code path

Dynamic Analysis:
Network Data Record: capture all the network data during the APK's running period
Http Data Recovery: recover data from http flow
IP Distribution Analysis: parse IP information based on the extracted URLs
File Operation Monitor: record file path and data
SMS & Phone Call Monitor: record sms sent and phone call
SMS Block Monitor: record sms block behavior
Crypto Operation Monitor: record crypto usage
Data Leakage Monitor: data leakage

Comprehensive Analysis:
Risky Behaviors Summary: list risky behaviors
Risk Score: Calculate the risk score based on the static and dynamic analysis result

Additional Details

transaction processing, backup, smartphone, computer memory, application programming interface, android, 1341, cryptographic protocol, communication protocol, application layer protocols, file system, alphabet inc, database application, google software, transport layer security, external data source, path, data recovery, data modeling, storage software, internet protocol, row, telephone call, google acquisitions, sanddroid, uniform resource identifier, teletraffic, natural language processing, hypertext transfer protocol, registered memory, inferlink corporation, technical communication, secure communication, history of computing, computer file, information extraction, memory module, relational model