SlideShare a Scribd company logo
1 of 3
Download to read offline
Md.Asha Begum et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 5, (Part - 5) May 2016, pp.52-54
www.ijera.com 52 | P a g e
Vulnerable Hunter
Md.Asha Begum,Y.VishnuPriya,V.ManoranjanBabu,O.Srinivasu
Cse&Jntukcse&Jntukcse&Jntukcse&JNTUK T.Y.Srinivasaraoassociate Professor
1, 2
Department of Computer Science & Engineering, St. Ann‟s College of Engineering& Technology,
Chirala, AP.,India
ABSTRACT
This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This
application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this
application it detects risk so that this application is very useful to smart phone users Now-a-days so many people
are using smart phones and people are crazy about new apps. But by installing all the applications into our
mobile may reduce its performance. Some apps contain more risk. But user may not know the effects that are
caused by the app which is installed until the performance of mobile is reduced. With the prosperity of
the Android app economy, many apps have been published and sold in various markets. However, short
development applications and insufficient security development apps have led to many vulnerable apps. So to
reduce these type of problems Vulnerable Hunter is proposed. Through the proposed application user can see
which application is risky and then the user may uninstall that application. The main advantage of designing this
app is without internet also the users will use this application. Users also feel more convenient to work with
mobile apps.
Keywords- Portable.
I. INTRODUCTION
Vulnerable Hunter is an Android
Application .It is used to find out the risk present in
the Android Mobile phone. Now-a-days Usage of
Android Mobile phones is increasing more and
more. Mobile user is also getting into habit of
installing all the new applications like Contacts,
WhatsApp, Telegram, Hike, Games etc. Now-a-
days so many people are using smart phones and
people are crazy about new apps. But by installing
all the applications into our mobile may reduce its
performance. Some apps contains more risk. But
user may not know the effects that are caused by
the app which is installed until the performance of
mobile is reduced. With the prosperity of
the Android app economy, many apps have been
published and sold in various markets. However,
short development applications and insufficient
security development apps have led to many
vulnerable apps. So to reduce these type of
problems Vulnerable Hunter is proposed. Through
the proposed application user can see which
application is risky and then the user may uninstall
that application.
II. RELATED WORK
In our proposed approach, this application
consists of many apps.In this app, we investigate
permission based vulnerable signals that use the
rarity of critical permissionsand pairs of critical
permissions. In this approach, initially reported in
permissions that have significant security or
privacy impact are identified as critical, and if an
app requests a critical permission (or a pair of
critical permissions) that is rarely requested by
apps in the same category, that app is labelled
asvulnerable. Using a binary vulnerable signal,
each app is labelled as either vulnerable or not.
Advantages
 Displays risk score for all the applications in a
graphical view.
 Applications that exceeds predefined risk score
may be uninstalled using the uninstall option.
 Data connection is not required.
Literature Survey
Android is a software stack for mobile
devices that includes an operating system,
middleware and key applications. The Android
SDK provides the tools and APIs necessary to begin
developing applications on the Android platform
using the Java programming language. The basic
components of an Android application include
Activity, Broadcast Receiver, Service, and Content
Provider. Each of these which when used for any
application has to be declared in the
AndroidManifest.xml. The user interface of the
component is determined by the Views. For the
Communication among these basic components, use
Intents and Intent filters which play crucial role
during app development.
RESEARCH ARTICLE OPEN ACCESS
Kalapala Prasad. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 5, (Part - 4) May 2016, pp.01-04
www.ijera.com 53 | P a g e
III. III.SYSTEMARCHITECTURE
IV. MODULES
In this project we are using 4 modules
1.Fetch Application 2. Generate Score
3. Uninstall 4. Display Graph
1. Fetch Application:-All the applications
that are installed in the mobile are fetched
into one screen that is the initial screen.
2. Generate Score:-Generates the score for
each and every application either
individually or it generates the score for all
the applications at a time in a graphical
manner.
3. Uninstall:-If the application exceeds the
predefined risk score then the uninstall
option is displayed by which the user may
uninstall that application.
4. Display Graph:-When the user wants to
see the risk score for all applications at a
time, then the user can click on the graph
symbol that displays the risk score for all
the applications in graphical manner.
V. RESULTS
Fig. 5.1: First Screen
Fig. 5.2: Second Screen
Fig. 5.3: Third Screen
Kalapala Prasad. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 5, (Part - 4) May 2016, pp.01-04
www.ijera.com 54 | P a g e
Fig. 5.4: List of Permissions
Fig. 5.5: Permission Information
VI. CONCLUSION
“VULNERABLE HUNTER” effectively
finds the risk in mobile applications and generates
score for each application. It is very useful to all the
smart phone users who are crazy about all new
applications. So by this application one can avoid
the risky applications that causes the decrease in
mobile performance.
REFERENCES
[1]. Java How To Program, Ninth Edition,
Deitel&Deitel.
[2]. Android Programming :The Big Nerd
Ranch Guide By Bill Philips & Brain
Hardy.
[3]. Programming Android
ByG.BlakeMeike& Masumi
Nakamura.
[4]. Website references used:
[5]. www.android.developer.com
[6]. www.wikipedia.com
[7]. www.stackoverflow.com
[8]. www.google.com

More Related Content

What's hot

Incident Management Mobile Application
Incident Management Mobile ApplicationIncident Management Mobile Application
Incident Management Mobile ApplicationMike Taylor
 
Mobile App Developers Survey on Mobile Devices with Embedded Pico Projection
Mobile App Developers Survey on Mobile Devices with Embedded Pico ProjectionMobile App Developers Survey on Mobile Devices with Embedded Pico Projection
Mobile App Developers Survey on Mobile Devices with Embedded Pico Projectioncompoundphotonics
 
Android Application for College
Android Application for CollegeAndroid Application for College
Android Application for Collegepaperpublications3
 
Continuous Mobile Testing Using Jenkins - A How To Guide
 Continuous Mobile Testing Using Jenkins - A How To Guide Continuous Mobile Testing Using Jenkins - A How To Guide
Continuous Mobile Testing Using Jenkins - A How To GuideKeynoteSystems
 
Android Wear Presentation
Android Wear PresentationAndroid Wear Presentation
Android Wear PresentationNanik Tolaram
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.iCreateWorld
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishКомсс Файквэе
 
On the Link Between Mobile App Quality and User Reviews
On the Link Between Mobile App Quality and User ReviewsOn the Link Between Mobile App Quality and User Reviews
On the Link Between Mobile App Quality and User ReviewsSAIL_QU
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET Journal
 
Mohsen-MahmoudCV
Mohsen-MahmoudCVMohsen-MahmoudCV
Mohsen-MahmoudCVMohsen Saad
 
Android Application Seminar_Usman
Android Application Seminar_UsmanAndroid Application Seminar_Usman
Android Application Seminar_UsmanUsman Sait
 
Appthority Presents at Under the Radar 2013
Appthority Presents at Under the Radar 2013Appthority Presents at Under the Radar 2013
Appthority Presents at Under the Radar 2013Dealmaker Media
 
Test Cases and Testing Strategies for Mobile Apps –A Survey
Test Cases and Testing Strategies for  Mobile Apps  –A SurveyTest Cases and Testing Strategies for  Mobile Apps  –A Survey
Test Cases and Testing Strategies for Mobile Apps –A SurveyIRJET Journal
 

What's hot (16)

Incident Management Mobile Application
Incident Management Mobile ApplicationIncident Management Mobile Application
Incident Management Mobile Application
 
Resume-TarunTanwar
Resume-TarunTanwarResume-TarunTanwar
Resume-TarunTanwar
 
Mobile App Developers Survey on Mobile Devices with Embedded Pico Projection
Mobile App Developers Survey on Mobile Devices with Embedded Pico ProjectionMobile App Developers Survey on Mobile Devices with Embedded Pico Projection
Mobile App Developers Survey on Mobile Devices with Embedded Pico Projection
 
Android Application for College
Android Application for CollegeAndroid Application for College
Android Application for College
 
Continuous Mobile Testing Using Jenkins - A How To Guide
 Continuous Mobile Testing Using Jenkins - A How To Guide Continuous Mobile Testing Using Jenkins - A How To Guide
Continuous Mobile Testing Using Jenkins - A How To Guide
 
Android Wear Presentation
Android Wear PresentationAndroid Wear Presentation
Android Wear Presentation
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
On the Link Between Mobile App Quality and User Reviews
On the Link Between Mobile App Quality and User ReviewsOn the Link Between Mobile App Quality and User Reviews
On the Link Between Mobile App Quality and User Reviews
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple Users
 
Mohsen-MahmoudCV
Mohsen-MahmoudCVMohsen-MahmoudCV
Mohsen-MahmoudCV
 
Android Application Seminar_Usman
Android Application Seminar_UsmanAndroid Application Seminar_Usman
Android Application Seminar_Usman
 
Mobile Apps Development by NicheTech India
Mobile Apps Development by NicheTech IndiaMobile Apps Development by NicheTech India
Mobile Apps Development by NicheTech India
 
Appthority Presents at Under the Radar 2013
Appthority Presents at Under the Radar 2013Appthority Presents at Under the Radar 2013
Appthority Presents at Under the Radar 2013
 
IRJET- Techhubb
IRJET-  	  TechhubbIRJET-  	  Techhubb
IRJET- Techhubb
 
Test Cases and Testing Strategies for Mobile Apps –A Survey
Test Cases and Testing Strategies for  Mobile Apps  –A SurveyTest Cases and Testing Strategies for  Mobile Apps  –A Survey
Test Cases and Testing Strategies for Mobile Apps –A Survey
 

Similar to Vulnerable Hunter

IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsJPINFOTECH JAYAPRAKASH
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine LearningIRJET Journal
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET Journal
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
Dr.mobi. “a medical suggestor in your hand”
Dr.mobi. “a medical suggestor in your hand”Dr.mobi. “a medical suggestor in your hand”
Dr.mobi. “a medical suggestor in your hand”eSAT Publishing House
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishDaniel zhao
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishКомсс Файквэе
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
Thorsignia - Custom software development services in india
Thorsignia - Custom software development services in indiaThorsignia - Custom software development services in india
Thorsignia - Custom software development services in indiacharan Teja
 
Assistance Application for Visually Impaired - VISION
Assistance Application for Visually  Impaired - VISIONAssistance Application for Visually  Impaired - VISION
Assistance Application for Visually Impaired - VISIONIJSRED
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android ProjectIRJET Journal
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationKavita Sharma
 

Similar to Vulnerable Hunter (20)

Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
 
how to choose right mobile app development tools
how to choose right mobile app development toolshow to choose right mobile app development tools
how to choose right mobile app development tools
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Dr.mobi. “a medical suggestor in your hand”
Dr.mobi. “a medical suggestor in your hand”Dr.mobi. “a medical suggestor in your hand”
Dr.mobi. “a medical suggestor in your hand”
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security Firewall
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security Firewall
 
Thorsignia - Custom software development services in india
Thorsignia - Custom software development services in indiaThorsignia - Custom software development services in india
Thorsignia - Custom software development services in india
 
Assistance Application for Visually Impaired - VISION
Assistance Application for Visually  Impaired - VISIONAssistance Application for Visually  Impaired - VISION
Assistance Application for Visually Impaired - VISION
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android Application
 

Recently uploaded

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Vulnerable Hunter

  • 1. Md.Asha Begum et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 5, (Part - 5) May 2016, pp.52-54 www.ijera.com 52 | P a g e Vulnerable Hunter Md.Asha Begum,Y.VishnuPriya,V.ManoranjanBabu,O.Srinivasu Cse&Jntukcse&Jntukcse&Jntukcse&JNTUK T.Y.Srinivasaraoassociate Professor 1, 2 Department of Computer Science & Engineering, St. Ann‟s College of Engineering& Technology, Chirala, AP.,India ABSTRACT This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps contain more risk. But user may not know the effects that are caused by the app which is installed until the performance of mobile is reduced. With the prosperity of the Android app economy, many apps have been published and sold in various markets. However, short development applications and insufficient security development apps have led to many vulnerable apps. So to reduce these type of problems Vulnerable Hunter is proposed. Through the proposed application user can see which application is risky and then the user may uninstall that application. The main advantage of designing this app is without internet also the users will use this application. Users also feel more convenient to work with mobile apps. Keywords- Portable. I. INTRODUCTION Vulnerable Hunter is an Android Application .It is used to find out the risk present in the Android Mobile phone. Now-a-days Usage of Android Mobile phones is increasing more and more. Mobile user is also getting into habit of installing all the new applications like Contacts, WhatsApp, Telegram, Hike, Games etc. Now-a- days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps contains more risk. But user may not know the effects that are caused by the app which is installed until the performance of mobile is reduced. With the prosperity of the Android app economy, many apps have been published and sold in various markets. However, short development applications and insufficient security development apps have led to many vulnerable apps. So to reduce these type of problems Vulnerable Hunter is proposed. Through the proposed application user can see which application is risky and then the user may uninstall that application. II. RELATED WORK In our proposed approach, this application consists of many apps.In this app, we investigate permission based vulnerable signals that use the rarity of critical permissionsand pairs of critical permissions. In this approach, initially reported in permissions that have significant security or privacy impact are identified as critical, and if an app requests a critical permission (or a pair of critical permissions) that is rarely requested by apps in the same category, that app is labelled asvulnerable. Using a binary vulnerable signal, each app is labelled as either vulnerable or not. Advantages  Displays risk score for all the applications in a graphical view.  Applications that exceeds predefined risk score may be uninstalled using the uninstall option.  Data connection is not required. Literature Survey Android is a software stack for mobile devices that includes an operating system, middleware and key applications. The Android SDK provides the tools and APIs necessary to begin developing applications on the Android platform using the Java programming language. The basic components of an Android application include Activity, Broadcast Receiver, Service, and Content Provider. Each of these which when used for any application has to be declared in the AndroidManifest.xml. The user interface of the component is determined by the Views. For the Communication among these basic components, use Intents and Intent filters which play crucial role during app development. RESEARCH ARTICLE OPEN ACCESS
  • 2. Kalapala Prasad. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 5, (Part - 4) May 2016, pp.01-04 www.ijera.com 53 | P a g e III. III.SYSTEMARCHITECTURE IV. MODULES In this project we are using 4 modules 1.Fetch Application 2. Generate Score 3. Uninstall 4. Display Graph 1. Fetch Application:-All the applications that are installed in the mobile are fetched into one screen that is the initial screen. 2. Generate Score:-Generates the score for each and every application either individually or it generates the score for all the applications at a time in a graphical manner. 3. Uninstall:-If the application exceeds the predefined risk score then the uninstall option is displayed by which the user may uninstall that application. 4. Display Graph:-When the user wants to see the risk score for all applications at a time, then the user can click on the graph symbol that displays the risk score for all the applications in graphical manner. V. RESULTS Fig. 5.1: First Screen Fig. 5.2: Second Screen Fig. 5.3: Third Screen
  • 3. Kalapala Prasad. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 5, (Part - 4) May 2016, pp.01-04 www.ijera.com 54 | P a g e Fig. 5.4: List of Permissions Fig. 5.5: Permission Information VI. CONCLUSION “VULNERABLE HUNTER” effectively finds the risk in mobile applications and generates score for each application. It is very useful to all the smart phone users who are crazy about all new applications. So by this application one can avoid the risky applications that causes the decrease in mobile performance. REFERENCES [1]. Java How To Program, Ninth Edition, Deitel&Deitel. [2]. Android Programming :The Big Nerd Ranch Guide By Bill Philips & Brain Hardy. [3]. Programming Android ByG.BlakeMeike& Masumi Nakamura. [4]. Website references used: [5]. www.android.developer.com [6]. www.wikipedia.com [7]. www.stackoverflow.com [8]. www.google.com