Leakage Detection And Risk Assessment: Lrpandroid
How to identify and manage information leakage of user privacy is a very crucial and sensitive topic for handheld mobile device manufacturers, telecommunication companies, and mobile device users. As the success of a financial fraud usually requires possessing a victim’s private information, new types of personal identity theft and private information acquirement attack are developed and deployed along with various Apps in order to steal personal private information from mobile device users. With more than 50% of smartphone market share, Android-based mobile phone vendors and Internet service providers have to face the new challenge on user privacy management. In this paper, we present a user privacy analysis framework for an Android platform called LRPdroid. The goals of LRPdroid are to achieve information leakage detection, user privacy disclosure evaluation, and privacy risk assessment for Apps installed on Android-based mobile devices. Leakage Detection And Risk Assessment: Lrpandroid With a formally defined user privacy model, LRPdroid can effectively support mobile users to manage their own privacy risks on targeted Apps. In addition, new privacy analysis viewpoints such as user perception and leakage awareness are introduced in LRPdroid. Two general App usage scenarios are evaluated with our system prototype to show the feasibility and practicability of the LRPdroid framework on user privacy management
Software Requirements: –
Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
User purchase some goods through online. And attacker views that transaction details while user transaction is unsecured manner.
In the life of the software development, problem analysis provides a base for design and development phase. The problem is analyzed so that sufficient matter is provided to design a new system. Large problems are sub-divided into smaller once to make them understandable and easy for finding solutions. Same in this project all the task are sub-divided and categorized.
- Register and login
- View Products
- Fliter Products
- Buy with Secured Gateway
- Buy with Unsecured Gateway (Using AES)
- Enter Card details
- Place Order
- Encrypted with AES
- Card details are encrypted
- Attack and leak the card details
Register Login Module:-
In login module the customer and merchants can login to the application if they already created their account and signed in.
User purchase some items through online with their online payment. When we use online payment we have enter our card details also.
After user purchasing attacker enter the system and view the user transactions details. Like card number, pin number and etc.