The todo list (defect) of Akana can be exhibited by the time line of our work on the agenda. In processing - Model more malicious actions and refine the existence plugins. - Reflection analysis. - De-obfuscation: DexGuard. Future work - De-obfuscation: APK Protect, HoseDex2Jar, Bangcle, etc. - Heuristic analysis: Permission defined >> permission used, encrypted string identification, etc. - Linear encrypted file identification. - A light weight simulator for solving obfuscated string problem. - Binary analysis. For more information, please visit our Development History.