What steps will reproduce the problem?
1. Run androsign.py against a large APK with relatively large number of
classes/methods.
What is the expected output? What do you see instead?
I would expect the malware variant match to run in around 2 minutes as it did in an older commit (downloaded at around May, 2012). Instead, it appears
to take infinite time (I haven't seen it go to completion yet). If I show the verbose output, it never goes out of the CUT ELEMENT *, ADD ELEMENT * loop.
What version of the product are you using? On what operating system?
Some commit from roughly the first week of July.
Please provide any additional information below.
Its so unbearably slow that I do not bother even trying to see if it will finish. I know this is an issue because older version of Androguard have run faster for the same APKs. So it must be a problem in the newer version of Androguard.
!!!NOTE!!!: Please leave a rough estimate of when this issue will be fixed.
Thanks!
Original issue reported on code.google.com by muhammad...@gmail.com on 17 Jul 2012 at 4:48
Original issue reported on code.google.com by
muhammad...@gmail.com
on 17 Jul 2012 at 4:48