Skip to content

shreyasri258/Andro-Shield

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation


Logo

Andro-Shield

A Simple Flutter app that lets users upload and check if an APK is safe to install or not.
View Demo»

Table of Contents
  1. About The Project
  2. Installation
  3. Future Goals
  4. Contact
  5. Acknowledgments

About The Project

Before going with the project, lets understand what an APK is? It is an file format that android uses to install apps. In this modern world, many of us install new apps in our mobile to make life easier, but there are few apps that are malicious which may steal the user's precious information or frustates the user by displaying many advertisements and slowing down the network, etc.

There are several types of malwares like:

  • VORMS: replicate themselves on the system and slows down network
  • SPYWARE: collects information and sends to hacker
  • TROJAN HORSE : does malicious operations under the appearance of a desired operation
  • RANSOMWARE: a type of encryption grasps control of system, The user has to pay a ransom (price) to the criminals to retrieve data
  • KEYLOGGERS: records everything the user types on his/her computer
  • ROOTKITS: modifies OS files to create backdoors,... and the list goes on...

This project helps the users as a defense system that works to detect malware samples before they have a chance to infect a vivtim's mobile.

Flask API: https://github.com/shreyasri258/malware-apk

Keras Model: https://github.com/shreyasri258/DL-model-for-Malicious-APK

(back to top)

Built With

This section lists the major frameworks/libraries used to bootstrap this project.

  • Flask
  • Dart
  • Flutter
  • Keras
  • Sklearn
  • Heroku

(back to top)

Installation

Below are the instructions on how to run the app.

  1. Clone the mentioned repo which consists of Flask API. (https://github.com/shreyasri258/malware-apk)
    git clone https://github.com/shreyasri258/malware-apk
  2. Host the Flask API on heroku or any other cloud service
  3. Clone the current repository and then do the changes accordingly as mentioned below
    git clone https://github.com/shreyasri258/Andro-Shield.git
  4. In the Malicious_android_app\lib\start_screen.dart file , replace your hosted FLASK API url.
    Uri.parse('Your API URL here'));
  5. Finally run the Malicious_android_app\main.dart file and you can see the output in the connected emulator.

(back to top)

FutureGoals

  • The Keras Model we are using now, does binary classification only, you can also work on multi-label classification that predicts different malware labels.
  • We are currently using the permissions dataset, we can also predict the malware using network traffic data of APK file, please refer a href="#acknowledgments">Acknowledgement Section to know more about this.
  • Try adding more front-end features like switching between light and dark themes, About Us and Contact Us pages.
  • Multi-language Support

Always make sure to remove unnecessary dependencies.

(back to top)

Contact

A Shreya Sri- @LinkedIn - [email protected]

Project Link: https://github.com/shreyasri258/Andro-Shield

(back to top)

Acknowledgments

I have listed these resources which I found helpful and also included a few of my favorites to kick things off!

( Below resources help you to get started with the network-traffic data based malware detection )

(back to top)

Demo Video

demo.mp4.mp4

(back to top)

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages