No. we are not writing any  antivirus or anti-spy applications.
Requirement is given a set of tasks application is suppose to do
we need to ensure the application is doing same and not beyond that.
We will be using package file for the verification( something like
sysinternals for win APIs )

Hope I am clear now.

Thanks
Naina


On Dec 11, 1:28 pm, Al Sutton <[EMAIL PROTECTED]> wrote:
> Naina,
>
> I'd see any attempt to by one application to monitor the calls made by
> another application outside of a debug environment as a security concern
> because those calls may contain sensitive information which I only want
> the specified application to use (e.g. passwords for accounts which get
> passed through as a data block to the http libraries to be sent over an
> SSL connection).
>
> My guess is you're trying to write one of three types of app;
> Anti-Virus, Anti-Spyware, or reverse engineering tool. The first two I
> believe should be handled by the platforms existing mechanisms (app
> sandboxing and maintaining an app blacklist), and I don't think anyone
> is going to do anything to accommodate the third.
>
> But that's just my view...
>
> Al.
>
>
>
>
>
> Naina K wrote:
> > Hello,
>
> > Thanks for the quick reply  .
> > Is there a way to register ( suppose our application ) ourselves and
> > get the information about the apis called  from another application (
> > using apks ). The intention is to find out that the application is not
> > doing any malicious calls  which it is not suppose to do ( like
> > accessing the contact details ) .  I am also aware that to some extent
> > the androidmanifest.xml  gives the permissions .
> > Please let me know.
>
> > Thanks
>
> > On 12/11/08, fadden <[EMAIL PROTECTED]> wrote:
>
> >> On Dec 10, 5:08 am, Naina <[EMAIL PROTECTED]> wrote:
>
> >>> I would like to know, if i have only .apk file with me, how to get the
> >>> APIs and Classes that are present in the .apk file. Please let me know
> >>> if anybody has any idea.
>
> >> There are two utility programs built in the open-source tree,
> >> "dexlist" and "dexdump".  "dexlist foo.apk" will give you a list of
> >> all of the methods found in foo.apk.  dexdump does a similar thing,
> >> but with vastly more detail.
>
> >> It looks like dexdump is included in v1.0r2 of the SDK, but dexlist is
> >> not.  An ARM version of dexdump may also be found on the device
> >> itself.
>
> --
> ======
> Funky Android Limited is registered in England & Wales with the
> company number  6741909. The registered head office is Kemp House,
> 152-160 City Road, London,  EC1V 2NX, UK.
>
> The views expressed in this email are those of the author and not
> necessarily those of Funky Android Limited, it's associates, or it's
> subsidiaries.- Hide quoted text -
>
> - Show quoted text -
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
[EMAIL PROTECTED]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to