Adil Khan 9 months ago
AdiKhanOfficial #FYP Ideas

HUNTDROID

Our project aims to identify, analyze, and prevent users? private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms

Project Title

HUNTDROID

Project Area of Specialization

Cyber Security

Project Summary

Our project aims to identify, analyze, and prevent users’ private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms

Project Objectives

Android phones continuously monitor the sensitive information of their users via Android apps. The basic goal is to ensure user security and privacy which is done by providing analysis by the platform provider, which ensures that the entirety of malware is extracted from the app marketplace.

Project Implementation Method

HUNTDROID is an analysis system seeking to automatically diagnose privacy leaks by judging if a privacy disclosure from an app is necessary for some functionalities of the app. Functionality-irrelevant privacy disclosures are not justifiable, and so are considered potential privacy leak cases. Such information disclosure is serious and can also be pervasive, given the fact that most mobile apps are essentially web applications, keeping most of their sensitive user data on the server-side. An in-depth study to understand the scope and magnitude of the problem at a large scale, however, has never been done before, due to the technical challenge in the automatic identification of such data sources inside the app code.

Benefits of the Project

Every individual who has an Android smartphone needs it and almost all of them would benefit from it. According to a rough estimate, about 2.5 billion Android smartphone users exist around the World and all of them would get benefit by securing their PII leaks that occur through Android apps.

Technical Details of Final Deliverable

The first step in our solution involves system analysis and analysis of network traffic. The next step would be the identification of PII while monitoring the Android apps. After the identification of PII, our analyzer will detect PII leaks occurring in the Android apps, and based on ML algorithms, it will prompt users about the data breach and take necessary actions to stop that breach.

Final Deliverable of the Project

Software System

Core Industry

Security

Other Industries

IT

Core Technology

Others

Other Technologies

Internet of Things (IoT)

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Raspberry pi Equipment12500025000
Raspberry Case Equipment135003500
Power Bank Equipment140004000
Marketing Miscellaneous 180008000
Human Resource Miscellaneous 120002000
Dataset Equipment12800028000
Total in (Rs) 70500
If you need this project, please contact me on contact@adikhanofficial.com
0
105
Performance Evaluation of non linear Estimators using Genetic Programm...

Our project is an R&D project we have to do research first then to get optimized resul...

1675638330.png
Adil Khan
9 months ago
E-Letter Box

E-Letter Box is a automated Electric Letter box. Actually it?s a replacement of local Lett...

1675638330.png
Adil Khan
9 months ago
BUSINESS CARD READER USING MACHINE LEARNING

After reading multiple research papers I understand a very common problem that people are...

1675638330.png
Adil Khan
9 months ago
FeedieNeedy

Through this project we both students of Mehran University of Engineering and Technology w...

1675638330.png
Adil Khan
9 months ago
Real time Sign Language to Text and Text to sign Language Interpreter

According to the World Health Organization there are about 466 million people in the world...

1675638330.png
Adil Khan
9 months ago