This dataset is derived from the Andro-Dumpsys system, which analyzes Android applications through volatile memory acquisition and similarity-based profiling. During execution in an emulator, the system extracts odex bytecode to address challenges introduced by anti-analysis techniques such as packing, dynamic loading, and dex encryption. Creator-centric artifacts—including certificate serial numbers, operation code patterns, metadata from AndroidManifest.xml, suspicious API sequences, permission usage, and system command traces—are parsed to construct behavioral profiles.
- Categories: