ISDi tool checks Android or iOS devices for apps that can be used for surveillaince (a.k.a "stalkerware", "spouseware", "spyware" apps). ISDi's technical details are included in "Clinical Computer Security for Victims of Intimate Partner Violence" (USENIX 2019). The blacklist is based on apps crawled in "The Spyware Used in Intimate Partner Violence" (IEEE S&P 2018).
For more information about contributing to ISDi, see the contribution guidelines.
ISDi currently supports macOS, Linux, and Termux/Android. If you are using a Windows device, you can use the Windows Subsystem for Linux 2 (WSL2), which can be installed by following these instructions. After this, follow the remaining instructions as a Linux user would.
- Python 3.8 or higher is required
- Check your version:
python3 --version - On macOS, install via:
brew install python - On Linux (Debian/Ubuntu):
sudo apt install python3 python3-pip
ISDi needs adb for scanning Android devices and pymobiledevice3 for scanning iOS devices.
macOS:
brew bundle
# Or manually:
brew install --cask android-platform-toolsFor iOS device support on macOS, pymobiledevice3 will be installed automatically with ISDi. For Android device support, ensure adb (Android Debug Bridge) is installed via the android-platform-tools above.
Linux (Debian/Ubuntu):
sudo apt install adbFor iOS device support on Linux, pymobiledevice3 will be installed automatically with ISDi. For Android device support, ensure adb is installed via the command above.
Windows Subsystem Linux (v2):
- Install
adbandpymobiledevice3in Windows and ensure it's in PATH. Do not install them in WSL2, as WSL cannot have access to USB devices. Verify the installation by runningadb.exeandpymobiledevice3.exein a command prompt terminal.
Termux/Android: See TERMUX_INSTALL.md for Android device setup.
The easiest way to install ISDi is via pip:
pip install isdi-scannerClone the repository and install in development mode:
git clone https://github.com/stopipv/isdi.git
cd isdi
pip install -e .After ISDi is installed, with an Android or iOS device plugged in and unlocked, run:
isdi runISDi will start a local web server on port 6200. Open your browser to http://localhost:6200 for the ISDi UI. In debug mode, the server is on port 6202.
Note: On first run, ISDi will download the app information database (~47MB) from GitHub. This may take a minute depending on your internet connection. An internet connection is required for the first run.
isdi run # Normal mode
isdi run --debug # Debug mode (verbose logging)
DEBUG=1 isdi run # Alternative debug flag
isdi --help # Show all optionsThen navigate to the URL shown in the terminal. Click on "Scan Instructions" and follow the instructions to prepare your device for the scan.
It should look something like this:
Connect a device and click on the suitable button Android or iOS. Give it a
nickname and click "Scan now". (Please connect one device at a time.) It
will take a few seconds for the scan to complete. We are working to have all
scan results done at once on Android, but for the time being please leave the
device plugged in when clicking on apps on the scan results table.
After the scan, the UI will look something like this:
Check device connection:
adb devicesCheck device connection:
pymobiledevice3 usbmux list- Run ISDi with
--debugflag for verbose logging - Check logs in
~/.local/share/isdi/logs/ - File issues on GitHub with error messages
See TERMUX_INSTALL.md for Termux-specific troubleshooting.
The data downloaded and stored in the study are the
following. 1. A sqlite database containing the feedback and actions taken by
the user. 2. phone_dump/ folder will have dump of some services in the
phone. (For Android I have figured out what are these, for iOS I don't know
how to get those information.)
The services that we can dump safely using dumpsys are the
following.
- Application static details:
packageSensor and configuration info: location,media.camera,netpolicy,mountResource information:cpuinfo,dbinfo,meminfoResource consumption:procstats,batterystats,netstats,usagestatsApp running information:activity,appops
See details about the services in notes.md
Only the appIds, and their names. Also, I got "permissions" granted
to the application. I don't know how to get install date, resource usage, etc.
(Any help will be greatly welcomed.)
-
src/isdi/scanner/- Core scanning logicparse_dump.py- Parses device dumps (Android/iOS)android_permissions.py- Android permission analysisprivacy_scan_android.py- Android privacy scanningblocklist.py- Stalkerware/spyware blocklist managementlightweight_df.py- CSV/data processing (pandas-free)db.py- SQLite database operationspmd3_wrapper.py- Termux-compatible pymobiledevice3 wrapper
-
src/isdi/web/- Flask web applicationtemplates/- HTML templates for the web UIstatic/- CSS, JavaScript, and imagesschema.sql- Database schema (embedded in code)forms/- WTForms for consultation formsmodel/- SQLAlchemy modelsview/- Flask route handlers
-
src/isdi/scripts/- Shell scripts for device interactionandroid_scan.sh- Android device scanningios_scan.sh- iOS device scanning
-
src/isdi/data/- Static data and reference filesapp-flags.csv- App classification metadataapp-info.db- Cached app informationandroid_permissions.csv- Android permission databaseios_permissions.json- iOS permission database
See notes.md for other developer helps.

