Our project aims to identify, analyze, and prevent users? private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms
HUNTDROID
Our project aims to identify, analyze, and prevent users’ private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms
Android phones continuously monitor the sensitive information of their users via Android apps. The basic goal is to ensure user security and privacy which is done by providing analysis by the platform provider, which ensures that the entirety of malware is extracted from the app marketplace.
HUNTDROID is an analysis system seeking to automatically diagnose privacy leaks by judging if a privacy disclosure from an app is necessary for some functionalities of the app. Functionality-irrelevant privacy disclosures are not justifiable, and so are considered potential privacy leak cases. Such information disclosure is serious and can also be pervasive, given the fact that most mobile apps are essentially web applications, keeping most of their sensitive user data on the server-side. An in-depth study to understand the scope and magnitude of the problem at a large scale, however, has never been done before, due to the technical challenge in the automatic identification of such data sources inside the app code.
Every individual who has an Android smartphone needs it and almost all of them would benefit from it. According to a rough estimate, about 2.5 billion Android smartphone users exist around the World and all of them would get benefit by securing their PII leaks that occur through Android apps.
The first step in our solution involves system analysis and analysis of network traffic. The next step would be the identification of PII while monitoring the Android apps. After the identification of PII, our analyzer will detect PII leaks occurring in the Android apps, and based on ML algorithms, it will prompt users about the data breach and take necessary actions to stop that breach.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Raspberry pi | Equipment | 1 | 25000 | 25000 |
| Raspberry Case | Equipment | 1 | 3500 | 3500 |
| Power Bank | Equipment | 1 | 4000 | 4000 |
| Marketing | Miscellaneous | 1 | 8000 | 8000 |
| Human Resource | Miscellaneous | 1 | 2000 | 2000 |
| Dataset | Equipment | 1 | 28000 | 28000 |
| Total in (Rs) | 70500 |
Our project is an R&D project we have to do research first then to get optimized resul...
E-Letter Box is a automated Electric Letter box. Actually it?s a replacement of local Lett...
After reading multiple research papers I understand a very common problem that people are...
Through this project we both students of Mehran University of Engineering and Technology w...
According to the World Health Organization there are about 466 million people in the world...