The todo list (defect) of Akana can be exhibited by the time line of our work on the agenda.

In processing
- Model more malicious actions and refine the existence plugins.
- Reflection analysis.
- De-obfuscation: DexGuard.

Future work
- De-obfuscation: APK Protect, HoseDex2Jar, Bangcle, etc.
- Heuristic analysis: Permission defined >> permission used, encrypted string identification, etc.
- Linear encrypted file identification.
- A light weight simulator for solving obfuscated string problem.
- Binary analysis.

For more information, please visit our Development History.