Skip to content
sonyericssondev edited this page Apr 13, 2012 · 3 revisions

ApkAnalyser also makes it possible to create a set of bytecode modifications, which could be applied to the APK file in a batch. This automatically adds printouts of suspicious pieces of code, to support you in investigating the execution flow of the application.

You can do this by using any of the three quick samples below. The injections could be applied on some packages, classes or even the whole APK.

I want to get all the input parameters when my application enters a method. In this case, we use FingerPaint in ApiDemo app from Android SDK as an example to show how we get the input paramters of myView.onTouchEvent(MotionEvent event)

I want to get the return value when my application call an Android API. In this case, we use FingerPaint in ApiDemo app from Android SDK as an example to show how we get the return value of android.view.MotionEvent.getX() when the application calling the method

I want to get all the values and call stacks when a field is being written, In this case, we use FingerPaint in ApiDemo app from Android SDK as an example to show how we get the values when someone modifying "private float mX, mY;" in MyView class. (it's more useful to get this kind of info on public fields. Anyways, it's just an example)