Adil Khan 10 months ago
AdiKhanOfficial #FYP Ideas

HUNTDROID

Our project aims to identify, analyze, and prevent users? private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms

Project Title

HUNTDROID

Project Area of Specialization

Cyber Security

Project Summary

Our project aims to identify, analyze, and prevent users’ private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms

Project Objectives

Android phones continuously monitor the sensitive information of their users via Android apps. The basic goal is to ensure user security and privacy which is done by providing analysis by the platform provider, which ensures that the entirety of malware is extracted from the app marketplace.

Project Implementation Method

HUNTDROID is an analysis system seeking to automatically diagnose privacy leaks by judging if a privacy disclosure from an app is necessary for some functionalities of the app. Functionality-irrelevant privacy disclosures are not justifiable, and so are considered potential privacy leak cases. Such information disclosure is serious and can also be pervasive, given the fact that most mobile apps are essentially web applications, keeping most of their sensitive user data on the server-side. An in-depth study to understand the scope and magnitude of the problem at a large scale, however, has never been done before, due to the technical challenge in the automatic identification of such data sources inside the app code.

Benefits of the Project

Every individual who has an Android smartphone needs it and almost all of them would benefit from it. According to a rough estimate, about 2.5 billion Android smartphone users exist around the World and all of them would get benefit by securing their PII leaks that occur through Android apps.

Technical Details of Final Deliverable

The first step in our solution involves system analysis and analysis of network traffic. The next step would be the identification of PII while monitoring the Android apps. After the identification of PII, our analyzer will detect PII leaks occurring in the Android apps, and based on ML algorithms, it will prompt users about the data breach and take necessary actions to stop that breach.

Final Deliverable of the Project

Software System

Core Industry

Security

Other Industries

IT

Core Technology

Others

Other Technologies

Internet of Things (IoT)

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Raspberry pi Equipment12500025000
Raspberry Case Equipment135003500
Power Bank Equipment140004000
Marketing Miscellaneous 180008000
Human Resource Miscellaneous 120002000
Dataset Equipment12800028000
Total in (Rs) 70500
If you need this project, please contact me on contact@adikhanofficial.com
0
116
IoT based tidal energy transducer

The process of rising and fall in ocean water known as tides are due to the attractiv...

1675638330.png
Adil Khan
10 months ago
Solid State Transformer(single phase)

This Project presents the single Phase Solid State Transformer (SST) used in Smart Grid. T...

1675638330.png
Adil Khan
10 months ago
LoRa WAN based Agricultural Support System For Optimum crops Yield

Pakistan is an agriculture farming country and nearly 60% of its population is associated...

1675638330.png
Adil Khan
10 months ago
Blinds People Examination System Using Leap sensor

Generally, blinds People are not participating in any online examination system without an...

1675638330.png
Adil Khan
10 months ago
Design and Control of Electromagnetic Suspension of an Electric Vehicl...

This project consists of an Electric Vehicle (EV) that is suspended in free space by Loren...

1675638330.png
Adil Khan
10 months ago