From 6d4d888edac6d2711557f7f8731143d03ccddf44 Mon Sep 17 00:00:00 2001 From: Ashish Bhatia Date: Sun, 28 Feb 2016 22:17:46 -0800 Subject: [PATCH] Update README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index f901754..cb137ac 100644 --- a/README.md +++ b/README.md @@ -49,6 +49,7 @@ A lot of work is happening in academia and industry on tools to perform dynamic * [CFGScanDroid](https://github.com/douggard/CFGScanDroid) - Scans and compares CFG against CFG of malicious applications * [Madrolyzer](https://github.com/maldroid/maldrolyzer) - extracts actionable data like C&C, phone number etc. * [SPARTA](http://www.cs.washington.edu/sparta) - verifies (proves) that an app satisfies an information-flow security policy; built on the [Checker Framework](http://checkerframework.org/) +* [ConDroid](https://github.com/JulianSchuette/ConDroid) - Performs a combination of symoblic + concrete execution of the app ## APP VULNERABILITY SCANNERS 1. [QARK](https://github.com/linkedin/qark/) - QARK by LinkedIn is for app developers to scan app for security issues