Skip to content
Meta Data Analysis
Meta Data Analysis

Automatically detect meta information and and further process them with our analysis engine.

Library Detection
Library Detection

Queryella’s Library Detection reliably discovers third-party libraries, used inside an app, including their actual version.

Obfuscation Analysis
Obfuscation Analysis

Deobfuscate strings and remove dynamic loading by replacing the dynamic code part with the actual code.

Static Analysis
Static Analysis

Identify data sources and sinks of an app, via static analysis and receive the data flow between these sources and sinks.

Dynamic Analysis
Dynamic Analysis

AI-powered and fully automated instrumentation to track data flows while running the app, including the newest anti-debugging detection.

Custom Analyses & Reports
Custom Analyses & Reports

Customize an analysis and its report to your individual needs, by either adding or removing individual analysis steps.

Did you know?

76%

out of 100,000 analyzed apps contain obfuscated strings.

An analysis using the tool StringHound showed that obfuscated strings hide:

  • critical usages of URLs
  • piggy-backed permissions
  • insecure cryptography algorithms
  • hard-coded credentials
  • dangerous services
  • root commands
  • API keys

Ad libraries are responsible for over 63% of obfuscated strings. Queryella does flag obfuscated privacy violations while other virus scanners fail to do so.

Supporters

Technische Universität Darmstadt
Software Technology Group
StartUp Secure
Bundestministerium

Featured Publication

Proceedings of the 15th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)

Association for Computing Machinery, New York, NY, USA, Article 31, 1–6. | DOI: https://doi.org/10.1145/3475716.3484195

Anna-Katharina Wickert, Lars Baumgärtner, Florian Breitfelder, and Mira Mezini.  
2021

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Association for Computing Machinery, New York, NY, USA, Article 31, 1–6. | DOI: https://doi.org/10.1109/TrustCom50675.2020.00063

J. Lauinger, L. Baumgärtner, A. -K. Wickert and M. Mezini 
2021

In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security

(pp. 694-700)

Glanz, L., Müller, P., Baumgärtner, L., Reif, M., Amann, S., Anthonysamy, P., & Mezini, M.  
2020, October