First of all, I'd say that collecting API calls does not really reliably determine if an app is malware. If it's a malicious app, why would it do something to obviously show that it's malicious :-)...
But there are a few ways to do this: - Disassemble the app and just look at the set of API calls. Lots of tools to do this, baksmali, etc... - Do some static analysis to determine which calls are actually exercised in real executions (some tools to do this..) - Instrument the app and dynamically look at the call sequences it makes (binary instrumentation or system modification for logging). If you just want the set of calls the app can possibly make, a cheap static approximation is simply disassembling the app. (But again, this is a very very rough approximation to malicious apps, so the answer to your question should be "you can't") Kris On Sun, Mar 10, 2013 at 7:54 AM, <[email protected]> wrote: > HI > how we can extract APIs calls from an android application in order to > decide if it is a malware > > -- > You received this message because you are subscribed to the Google Groups > "Android Security Discussions" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > To post to this group, send email to > [email protected]. > Visit this group at > http://groups.google.com/group/android-security-discuss?hl=en. > For more options, visit https://groups.google.com/groups/opt_out. > > > -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/android-security-discuss?hl=en. For more options, visit https://groups.google.com/groups/opt_out.
