HUNTDROID
Our project aims to identify, analyze, and prevent users? private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms
2025-06-28 16:27:44 - Adil Khan
HUNTDROID
Project Area of Specialization Cyber SecurityProject SummaryOur project aims to identify, analyze, and prevent users’ private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms
Project ObjectivesAndroid phones continuously monitor the sensitive information of their users via Android apps. The basic goal is to ensure user security and privacy which is done by providing analysis by the platform provider, which ensures that the entirety of malware is extracted from the app marketplace.
Project Implementation MethodHUNTDROID is an analysis system seeking to automatically diagnose privacy leaks by judging if a privacy disclosure from an app is necessary for some functionalities of the app. Functionality-irrelevant privacy disclosures are not justifiable, and so are considered potential privacy leak cases. Such information disclosure is serious and can also be pervasive, given the fact that most mobile apps are essentially web applications, keeping most of their sensitive user data on the server-side. An in-depth study to understand the scope and magnitude of the problem at a large scale, however, has never been done before, due to the technical challenge in the automatic identification of such data sources inside the app code.
Benefits of the ProjectEvery individual who has an Android smartphone needs it and almost all of them would benefit from it. According to a rough estimate, about 2.5 billion Android smartphone users exist around the World and all of them would get benefit by securing their PII leaks that occur through Android apps.
Technical Details of Final DeliverableThe first step in our solution involves system analysis and analysis of network traffic. The next step would be the identification of PII while monitoring the Android apps. After the identification of PII, our analyzer will detect PII leaks occurring in the Android apps, and based on ML algorithms, it will prompt users about the data breach and take necessary actions to stop that breach.
Final Deliverable of the Project Software SystemCore Industry SecurityOther Industries IT Core Technology OthersOther Technologies Internet of Things (IoT)Sustainable Development Goals Industry, Innovation and InfrastructureRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 70500 | |||
| Raspberry pi | Equipment | 1 | 25000 | 25000 |
| Raspberry Case | Equipment | 1 | 3500 | 3500 |
| Power Bank | Equipment | 1 | 4000 | 4000 |
| Marketing | Miscellaneous | 1 | 8000 | 8000 |
| Human Resource | Miscellaneous | 1 | 2000 | 2000 |
| Dataset | Equipment | 1 | 28000 | 28000 |