HUNTDROID

Our project aims to identify, analyze, and prevent users? private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms

2025-06-28 16:27:44 - Adil Khan

Project Title

HUNTDROID

Project Area of Specialization Cyber SecurityProject Summary

Our project aims to identify, analyze, and prevent users’ private information via android apps and will try to identify and cure all types of data leaks via android apps with the help of ML algorithms

Project Objectives

Android phones continuously monitor the sensitive information of their users via Android apps. The basic goal is to ensure user security and privacy which is done by providing analysis by the platform provider, which ensures that the entirety of malware is extracted from the app marketplace.

Project Implementation Method

HUNTDROID is an analysis system seeking to automatically diagnose privacy leaks by judging if a privacy disclosure from an app is necessary for some functionalities of the app. Functionality-irrelevant privacy disclosures are not justifiable, and so are considered potential privacy leak cases. Such information disclosure is serious and can also be pervasive, given the fact that most mobile apps are essentially web applications, keeping most of their sensitive user data on the server-side. An in-depth study to understand the scope and magnitude of the problem at a large scale, however, has never been done before, due to the technical challenge in the automatic identification of such data sources inside the app code.

Benefits of the Project

Every individual who has an Android smartphone needs it and almost all of them would benefit from it. According to a rough estimate, about 2.5 billion Android smartphone users exist around the World and all of them would get benefit by securing their PII leaks that occur through Android apps.

Technical Details of Final Deliverable

The first step in our solution involves system analysis and analysis of network traffic. The next step would be the identification of PII while monitoring the Android apps. After the identification of PII, our analyzer will detect PII leaks occurring in the Android apps, and based on ML algorithms, it will prompt users about the data breach and take necessary actions to stop that breach.

Final Deliverable of the Project Software SystemCore Industry SecurityOther Industries IT Core Technology OthersOther Technologies Internet of Things (IoT)Sustainable Development Goals Industry, Innovation and InfrastructureRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 70500
Raspberry pi Equipment12500025000
Raspberry Case Equipment135003500
Power Bank Equipment140004000
Marketing Miscellaneous 180008000
Human Resource Miscellaneous 120002000
Dataset Equipment12800028000

More Posts