First of all, I'd say that collecting API calls does not really reliably
determine if an app is malware.  If it's a malicious app, why would it do
something to obviously show that it's malicious :-)...

But there are a few ways to do this:
 - Disassemble the app and just look at the set of API calls.  Lots of
tools to do this, baksmali, etc...
 - Do some static analysis to determine which calls are actually exercised
in real executions (some tools to do this..)
 - Instrument the app and dynamically look at the call sequences it makes
(binary instrumentation or system modification for logging).

If you just want the set of calls the app can possibly make, a cheap static
approximation is simply disassembling the app.

(But again, this is a very very rough approximation to malicious apps, so
the answer to your question should be "you can't")

Kris


On Sun, Mar 10, 2013 at 7:54 AM, <[email protected]> wrote:

> HI
> how we can extract APIs calls from an android application in order  to
> decide if it is a  malware
>
> --
> You received this message because you are subscribed to the Google Groups
> "Android Security Discussions" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To post to this group, send email to
> [email protected].
> Visit this group at
> http://groups.google.com/group/android-security-discuss?hl=en.
> For more options, visit https://groups.google.com/groups/opt_out.
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to