Monitoring how applications communicate through intents is essential for the integrity of Android systems. One way to do this is by analyzing the inter-process communication (IPC) mechanism.
Drozer is a comprehensive security attack framework for Android. Its capabilities include the ability to analyze Android’s interprocess communication (IPC) mechanism and to then interact with the underlying operating system. Drozer can be used to remotely exploit Android devices. Currently, Drozer doesn’t provide fuzz testing on the intents in Android. This project adds this new functionality to Drozer, and allows us to send fuzzed intents to the applications installed on Android devices. We can then analyze the system logcat, and collect information based on which of the intents have generated crashes.