[en] Reverse engineering Android apps remains a critical and labor-intensive task, particularly for analyzing novel malware. Analysts typically begin with decompiled Java code using tools like JaDX and often must correlate it with runtime information gathered from dynamic analysis. In this work, we present JaDX-ACVTool, a plugin that bridges this gap by integrating code coverage information from ACVTool directly into JaDX-GUI. Our approach highlights Java methods executed during analysis, enabling security analysts to quickly identify and navigate runtime-relevant code paths. Plugin repository: https://github.com/pilgun/jadx-acvtool
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > TruX - Trustworthy Software Engineering