FirmwareDroid is a research project that aims to develop novel methods to analyse Android firmware. It is mainly made to automate the process of extracting and scanning pre-installed Android apps for security research purposes. FMD is made to run in docker and includes several third party analysis tools for security analysis and extraction. For instance:
- AndroGuard
- Androwarn
- VirusTotal
- Quark-Engine
- Qark
- SUPER Android Analyzer
- APKiD
- Exodus-Core
- APKLeaks
- Fuzzy-Hashing (currently unavailable -> refactoring in progress)
- Unblob
In this repository you will find the code for the backend of FMD. The application has a minimal React frontend (see https://github.com/FirmwareDroid/FMD-WebClient), but is mainly an API and database that can be use for research studies.
Usage documentation can be found at: https://firmwaredroid.github.io/
We are happy to accept contributions to the software and documentation. Feel free to open a pull request with your enhancements.
FMD has only a minimal set of security features and is not a production ready software. Use at your own risk.
FirmwareDroid: Towards Automated Static Analysis of Pre-Installed Android Apps
@INPROCEEDINGS{FirmwareDroid,
author={Sutter, Thomas and Tellenbach, Bernhard},
booktitle={2023 IEEE/ACM 10th International Conference on Mobile Software Engineering and Systems (MOBILESoft)},
title={FirmwareDroid: Towards Automated Static Analysis of Pre-Installed Android Apps},
year={2023},
month={May},
pages={12-22},
doi={10.1109/MOBILSoft59058.2023.00009}
}
FirmwareDroid is a non-profit research project licenced under the GNU General Public License v3.0 (see our licence).