What steps will reproduce the problem?
1. _a = AndroguardS(inputfile.apk)
perm_set_1 = _a.get_analysis().get_permissions([])
2. a = apk.APK(inputfile.apk, raw)
perm_set_2 = a.get_details_permissions()
perm_set_1 != perm_set_2 !
From my experience with malware apks, the first set is the one that is
effectively used by the code, or am I wrong?
But the risk module takes into consideration the 2nd set while computing the
risk score (or am I wrong again?)
I'm using:
androrisk.py --version
Androrisk version 1.0
on Linux version 3.3.5-2.fc16.i686.PAE (mockbuild@x86-07.phx2.fedoraproject.org)
Of course Anthony, I realize that this might be the behaviour that you desire
for androguard, I just wanted to be sure that you're aware... :)
Best Regards,
Madalina
Original issue reported on code.google.com by madalina...@telecomitalia.it on 4 Jun 2012 at 9:48
Original issue reported on code.google.com by
madalina...@telecomitalia.it
on 4 Jun 2012 at 9:48