forked from ericwhyne/darpa_open_catalog
-
Notifications
You must be signed in to change notification settings - Fork 0
/
APAC-software.json
316 lines (316 loc) · 8.49 KB
/
APAC-software.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
[
{
"DARPA Program":"APAC",
"Program Teams":[
"MIT",
"Kestrel Institute",
"GITI"
],
"Contributors":[
""
],
"Sub-contractors":[
""
],
"Software":"DroidSafe",
"Internal Link":"",
"External Link":"",
"Public Code Repo":"https://github.com/mgordon/droidsafe.git",
"Instructional Material":"",
"Description":"The DroidSafe static analysis tool produces a security summary of Android applications to help trusted parties rapidly understand sensitive behaviors of a untrusted application. The core analysis is flow, object, event, and value sensitive. The results are presented in a graphic user interface tied to source code for inspection. (Java/Python)",
"License":[
"LGPL"
],
"Languages":[
"Java",
"Python"
],
"Platform Requirements":[
""
],
"Dependent modules":[
""
],
"Dependent module URLs":[
""
],
"Component modules":[
""
],
"Component module URLs":[
""
],
"Industry":[
""
],
"Functionality":[
""
],
"Categories":[
"Infrastructure"
],
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"APAC",
"Program Teams":[
"BAE Systems"
],
"Contributors":[
""
],
"Sub-contractors":[
""
],
"Software":"Droid Reasoning, Analysis, and Protection Engine (DRAPE)",
"Internal Link":"",
"External Link":"",
"Public Code Repo":"Not Ready for Release",
"Instructional Material":"",
"Description":"DRAPE brings together concolic execution, taint analysis and execution path clustering to analyze Android applications. DRAPE will elicit stealthy malware that is triggered under specific conditions, and will provide the analyst with a characterization of those conditions. (Java)",
"Internal Code Repo":"",
"License":[
""
],
"Languages":[
"Java"
],
"Platform Requirements":[
""
],
"Dependent modules":[
""
],
"Dependent module URLs":[
""
],
"Component modules":[
""
],
"Component module URLs":[
""
],
"Industry":[
""
],
"Functionality":[
""
],
"Categories":[
"Sofware Analysis",
"Dynamic Analysis",
"Android",
"Malware"
],
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"APAC",
"Program Teams":[
"University of Washington"
],
"Contributors":[
""
],
"Sub-contractors":[
""
],
"Software":"Checker Framework",
"Internal Link":"",
"External Link":"http://types.cs.washington.edu/checker-framework",
"Public Code Repo":"https://code.google.com/p/checker-framework/",
"Instructional Material":"",
"Description":"The Checker Framework enhances Java's type system to make it more powerful and useful. This lets software developers detect and prevent errors in their Java programs. (Java)",
"Internal Code Repo":"",
"License":[
"GPLv2"
],
"Languages":[
"Java"
],
"Platform Requirements":[
""
],
"Dependent modules":[
""
],
"Dependent module URLs":[
""
],
"Component modules":[
""
],
"Component module URLs":[
""
],
"Industry":[
""
],
"Functionality":[
""
],
"Categories":[
"Static analysis"
],
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"APAC",
"Program Teams":[
"University of Washington"
],
"Contributors":[
""
],
"Sub-contractors":[
""
],
"Software":"Type annotations compiler",
"Internal Link":"",
"External Link":"http://types.cs.washington.edu/jsr308",
"Public Code Repo":"https://code.google.com/p/jsr308-langtools/",
"Instructional Material":"",
"Description":"Java 8 will include support for type annotations. The Type Annotations compiler (also called the JSR 308 compiler) is fully backward-compatible. You can use it in place of javac (for Java 8) without any change in behavior, except that you will be permitted to write annotations in comments. This lets you write type annotations, but keep your code compilable by Java 4/5/6/7 compilers. (Java)",
"Internal Code Repo":"",
"License":[
"GPLv2"
],
"Languages":[
"Java"
],
"Platform Requirements":[
""
],
"Dependent modules":[
""
],
"Dependent module URLs":[
""
],
"Component modules":[
""
],
"Component module URLs":[
""
],
"Industry":[
""
],
"Functionality":[
""
],
"Categories":[
"Static analysis",
"Compiler"
],
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"APAC",
"Program Teams":[
"University of Washington"
],
"Contributors":[
""
],
"Sub-contractors":[
""
],
"Software":"Annotation File Utilities",
"Internal Link":"",
"External Link":"http://types.cs.washington.edu/annotation-file-utilities/",
"Public Code Repo":"https://code.google.com/p/annotation-tools/",
"Instructional Material":"",
"Description":"Tools for reading annotations from, and inserting type annotations in, Java source and class files. (Java)",
"Internal Code Repo":"",
"License":[
"MIT"
],
"Languages":[
"Java"
],
"Platform Requirements":[
""
],
"Dependent modules":[
""
],
"Dependent module URLs":[
""
],
"Component modules":[
""
],
"Component module URLs":[
""
],
"Industry":[
""
],
"Functionality":[
""
],
"Categories":[
"Java Annotation Tool"
],
"New Date":"",
"Update Date":""
},
{
"DARPA Program":"APAC",
"Program Teams":[
"University of Washington"
],
"Contributors":[
""
],
"Sub-contractors":[
""
],
"Software":"SPARTA Toolset",
"Internal Link":"",
"External Link":"http://types.cs.washington.edu/sparta/",
"Public Code Repo":"http://types.cs.washington.edu/sparta/release/",
"Instructional Material":"",
"Description":"SPARTA aims to detect certain types of malware in Android applications, or to verify that the app contains no such malware. SPARTA's verification approach is type-checking: the developer states a security property, annotates the source code with type qualifiers that express that security property, then runs a pluggable type-checker to verify that the type qualifiers are right (and thus that the program satisfies the security property). (Java)",
"Internal Code Repo":"",
"License":[
"GPLv2"
],
"Languages":[
"Java"
],
"Platform Requirements":[
""
],
"Dependent modules":[
""
],
"Dependent module URLs":[
""
],
"Component modules":[
""
],
"Component module URLs":[
""
],
"Industry":[
""
],
"Functionality":[
""
],
"Categories":[
"Static analysis",
"Android",
"Security"
],
"New Date":"",
"Update Date":""
}
]