Sie sind auf Seite 1von 14

GENERATING SUMMERY RISK SCORES FOR MOBILE

APPLICATIONS
project report submitted in partial fulfillment of

the requirements for the award of the degree of

MASTER OF COMPUTER APPLICATIONS

Awarded By
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA,
KAKINADA.
Submitted by
PERI.ALEKHYA
(16H41F0026)
Under the esteemed guidance of
Mr.SAPPA.SURESH, B.Tech,M.Tech,MISTE,

Assistant Professor ,
Department of MCA.

DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS


B.V.C.INSTITUTE OF TECHNOLOGY & SCIENCE
(Approved by A.I.C.T.E, New Delhi , Accredited by NAAC &permanently Affiliated to J.N.T.U K, Kakinada)
AMALAPURAM - 533 201
2019
DEPARTMENT OF MASTER OF COMPUTER APPLICATIONS
B.V.C.INSTITUTE OF TECHNOLOGY & SCIENCE
(Approved by A.I.C.T.E, New Delhi , Accredited by NAAC &permanently Affiliated to J.N.T.U K, Kakinada)
AMALAPURAM – 533201

CERTIFICATE
This is to certify that the project work on “GENERATING SUMMERY RISK
SCORES FOR MOBILE APPLICATIONS” submitted Ms.PERI.ALEKHYA
(16H41F0026) is examined and adjudged as sufficient as a partial requirement for the
Master of Computer Applications at Jawaharlal Nehru Technological University
Kakinada, Kakinada is a bonafide record of the work done by her under my guidance and
supervision.

Internal Guide Head of The Department

Mr.SAPPA.SURESH,B.Tech.M.Tech,MISTE, Dr. M. PRASAD,M.Tech, MISTE, MCSI, (Ph.D.),


Assistant Professor, Associate Professor& Head,
Department of MCA. Department of MCA.

PROJECT EXTERNAL EXAMINER


DISSERTATION CERTIFICATE

This is to certify that the entitled dissertation“GENERATING SUMMERY RISK SCORE


FOR MOBILE APPLICATIONS”submittedby Ms. PERI ALEKYA (16H41F0026)
student of Master of Computer Applications of BVC Institute of Technology &
Science, Amalapuram, permanently affiliated to Jawaharlal Nehru Technological
University Kakinada, Kakinada is hereby accepted and approved as a credible work. It
is further certified that this work has not been submitted for similar purpose anywhere
else. Her work has been found satisfactory for the partial fulfillment of the award of the
degree of MCA.

INTERNAL EXAMINER EXTERNAL EXAMINER

Head of the Department

Master of Computer Applications

Bonam Venkata Chalamayya Institute of Technology &Science

Batlapalem,Amalapuram - 533 201


DECLARATION BY THE CANDIDATE

I, Ms. PREI . ALEKHYA hereby declare that the project work entitled “GENERATING

RISK SCORES FOR MOBILE APPLICATION”is an authenticated work carried out by me at


B.V.C Institute of Technology and Science Amalapuram ,under guidance ofMr Sappa. Suresh
,B.Tech,M.Tech,MISTE,for the partial fulfillment of the award of the degree of Master of
Computer Applications and this work has not been submitted for similar purpose anywhere
else except to BVC Institute of Technology & Science, Amalapuram permanently affiliated to
Jawaharlal Nehru Technological University Kakinada, Kakinada.

(Signature)

Date: Ms. PERI.ALEKHYA

Place: Regd.No: 16H41F0026


ACKNOWLEDGEMENT

I would like to express my heartiest concern of words to all those people who have
helped me in various ways to complete my project.

I was highly indebted to Mr. SAPPA.SURESH, B.Tech, M.Tech, MISTE), my internal guide.
He has been a constant source of encouragement and has inspired me in completing the project
and helped me at various stages of project work

My sincere thanks to respectable Dr. M.PRASAD, M.Tech, MISTE, MCSI, (Ph.D), Associate Professor
and Head of the Department of Master of Computer Applications, for his timely suggestions and
co-operation for my project completion.

I would like to express my heartfelt gratitude to our Principal, Dr. G.M.V.PRASAD,


M.Tech, Ph.D, FIETE, FIE, MIEEE, MSEMCE, MISTE for forecasting an excellent academic environment
and support.

I would like to extend my sincere thanks to all our department faculty members,
technicians and my family members for their help in completing the project.

Ms. PERI.ALEKHYA
Regd.No:16H41F0026
ABSTRACT
ABSTRACT:

One of Android’s main defense mechanisms against malicious apps is a risk communication

mechanism which, before a user installs an app, warns the user about the permissions the app

requires, trusting that the user will make the right decision. This approach has been shown to be

ineffective as it presents the risk information of each app in a “stand-alone” fashion and in a way

that requires too much technical knowledge and time to distill useful information. We discuss the

desired properties of risk signals and relative risk scores for Android apps in order to generate

another metric that users can utilize when choosing apps. We present a technique to generate

both risk signals and risk scores that are based on heuristics. Experimental results conducted

using real-world data sets show that these methods can effectively identify malware as very

risky, are simple to understand, and easy to use.


LIST OF FIGURES

FIGURE No. NAME OF THE FIGURE PAGE No.

Fig 2.1. Android Manifest.xml 5

Fig 2.2. Most Frequently Used Permissions 7

Fig 4.1. DFD Symbols 14

Fig 4.2. Level 0 DFD diagram 14

Fig 4.3. Level 1 DFD diagram 16

Fig 4.4. Use Case Diagram symbols 17

Fig 4.5. Use Case Diagram 18

Fig 4.6. Class Diagram 19

Fig 4.7. Sequence Diagram 20

Fig 4.8. Activity Diagram 22

Fig 4.9. Collaboration Diagram 23

Fig 5.1. Skeleton of Android 28

Fig 7.1 Splash Screen 43

Fig 7.2 Main Page 43

Fig 7.3 Help Page 44

Fig 7.4 Internet not connected 44

Fig 7.5 Opens Play Store 45

Fig 7.6 Installing app from Play Store 45

Fig 7.7 Accepting the permissions while installing 46

Fig 7.8 Blocking the app 46

Fig 7.9 Installed App Names 47

Fig 7.10 Risk Score of an App 47

Fig 7.11 Information about the permission 48

Fig 7.12 Unblock an App 48


LIST OF TABLES

TABLE No. NAME OF THE TABLE PAGE No.

Tab 2.1. List of Critical Permissions 8


Tab 4.1. Table for Storing the App names 24
Tab 4.2. Table when we unblock the application 25
Tab 6.1. Table Information about Positive test cases 41
Tab 6.2. Table Information about Negative test cases 42
LIST OF ABBREVIATIONS

DFD -- Dataflow Diagrams

UML -- Unified Modeling Language

XML -- Extensible Mark-up Language

OS -- Operating System

UI -- User Interface

IDE -- Integrated Development Environment

SDK -- Software Development Kit

ADT -- Android Development Tools


TABLE OF CONTENTS

Contents Page No.

CERTIFICATE

ACKNOWLEDGEMENT

ABSTRACT

LIST OF FIGURES

LIST OF TABLES

LIST OF ABBREVIATIONS

Chapter 1 : INTRODUCTION
1.1 Introduction 1
1.2 Motivation 2
1.3 Objective of the Thesis 2
1.4. Organization of Thesis 3

Chapter 2: LITERATURE SURVEY 4

2.1 Basic concepts


2.1.1Activity 4
2.1.2 Broadcast Receiver 4
2.1.3 Service 4
2.1.4 Content Provider 5
2.1.5 Intents 5
2.1.6.AndroidManifest.xml 5
2.1.7 Views 6
2.1.8 Notification 6
2.2 Related work 6
2.2.1 Permissions and Usefulness 6
2.2.2 Risk Score Generation 7

Chapter 3: PROPOSED WORK & ANALYSIS 10


3.1 Proposed Work & Analysis 10
3.2 Feasibility Study 10
3.2.1 Economy Feasibility 10
3.2.2 Technical Feasibility 10
3.2.3 Operational Feasibility 11

Chapter 4: DESIGN 12
4.1 System Design 12
4.2 Data Flow Diagrams 13
4.2.1 DFD Symbols 13
4.2.2 Context Level Diagrams 14
4.2.3 Detailed Level Diagram 15
4.3 UML Diagrams 17
4.3.1. Use Case Diagram 17
4.3.2. Class Diagram 19
4.3.3. Sequence Diagram 19
4.3.4. Activity Diagram 21
4.3.5. Collaboration Diagram 23
4.4 Database Design 24

4.4.1 what is SQLite 24

Chapter 5: IMPLEMENTATION 27

5.1 Software Requirements 27

5.2 Hardware Requirements 28

5.3 Technologies used 28

5.3.1 What is android ? 28


5.3.2 Framework of Android 29

5.3.2.1 Skeleton of Android 29

5.3.3 About Android Framework 29

5.4 Coding 31

Chapter 6: TESTING 38

6.1 Testing Objectives 38

6.1.1 White-box and black-box testing 38

6.2 Test Cases 40

6.2.1 positive Test Cases 40

6.2.2 Negative Test Cases 42

Chapter 7: RESULTS 43

Chapter 8: CONCLUSIONS 49

Chapter 9: FUTURE SCOPE 50

Chapter 10: BIBILIOGRAPHY 51

Das könnte Ihnen auch gefallen