Problem Statements

Challenge Accepted: Pioneering Solutions for Tomorrow at HackSavvy-24

Cybersecurity & Blockchain Technology

Cybersecurity & Blockchain Technology

CSBT-PS-1: Developing a Blockchain-Based eVault for Legal Records

The objective is to develop a blockchain-based eVault system for legal records that can ensure security, transparency, and accessibility for all stakeholders. This system should be capable of storing, managing, and sharing legal records securely and efficiently, with the potential to integrate with existing legal databases and case management systems.
Requirements include:
1. Utilizing a blockchain platform such as Ethereum, Hyperledger, or Corda and employing smart contracts to manage access permissions and transactions.
2. Providing user-friendly interfaces for lawyers, judges, clients, and other stakeholders to upload, retrieve documents, track changes, and share information.
3. Ensuring privacy and confidentiality of legal records with appropriate access controls, encryption, and authentication mechanisms.
4. Allowing seamless integration with existing legal databases and case management systems for interoperability and ease of use.
5. The system should be scalable and adaptable to accommodate future changes and upgrades. Expected outcomes include a functional prototype with a user-friendly interface, a detailed design document outlining the architecture, features, and technical specifications, and a business plan detailing potential impact, market opportunities, and revenue models. This blockchain-based eVault system aims to improve access to justice in India by enabling faster, more efficient court proceedings, reducing costs, improving data integrity, and increasing trust in the justice system, providing a secure and transparent platform for storing and sharing legal records.
Outcomes:
1. A functional prototype of the blockchain-based eVault system for legal records, with a user-friendly interface and features such as document upload, retrieval, and sharing.
2. A detailed design document outlining the architecture, features, and technical specifications of the eVault system.
3. A business plan outlining the potential impact, market opportunities, and revenue models for the eVault system.
4. A presentation of the prototype, design document, and business plan.
Impact: The development of a blockchain-based eVault system for legal records can have a significant impact on improving access to justice in India. It can lead to faster, more efficient court proceedings, reduced costs, improved data integrity, and increased trust in the justice system. Moreover, it can provide a secure and transparent platform for storing and sharing legal records, making it easier for clients to access their own records and for lawyers to access relevant case information.

Blockchain Technology/Software

CSBT-PS-2: Design of CYBER-SECURITY ENABLED SMART CONTROLLER for Grid-Connected Microgrid

This project aims to develop a cybersecurity-enabled smart controller specifically designed for grid-connected microgrids. The controller will play a crucial role in ensuring the secure and efficient operation of the microgrid, protecting it from cyber threats and unauthorized access.

Key Objectives include:

  • Secure Communication: Design a communication framework using robust encryption protocols to safeguard data transmission, preventing unauthorized access, tampering, and eavesdropping.
  • Intrusion Detection and Prevention: Implement advanced mechanisms within the controller to identify and mitigate cyber-attacks in real-time, using algorithms to detect anomalies and malicious activities.
  • Access Control: Create an access control mechanism that regulates user access based on roles, preventing unauthorized configuration changes.
  • Cybersecurity Auditing: Develop a logging and auditing system to track cybersecurity-related activities, providing detailed logs for post-incident analysis.
  • Security Patch Management: Implement a mechanism to manage and deploy security patches, ensuring the microgrid system’s vulnerabilities are promptly addressed.
  • Scalability and Compatibility: Ensure the smart controller’s design is scalable and compatible with various microgrid components and standards for seamless integration.
  • Usability and User Interface: Develop a user-friendly interface for efficient monitoring and management of cybersecurity settings, accessible to both experts and non-technical users.

This project encourages the exploration of innovative cybersecurity methodologies, including encryption algorithms, anomaly detection techniques, and secure communication protocols. The resulting smart controller will significantly contribute to the protection and reliable operation of grid-connected microgrids, ensuring the stability and security of the power distribution system amid evolving cyber threats.

Blockchain Technology/Software

CSBT-PS-3: Fake Social Media Profile Detection and Reporting

The proliferation of online social networks has significantly impacted social interactions, facilitating connections and communications. However, the rapid growth of these platforms has also led to challenges such as fake profiles and online impersonation, which can spam legitimate users and post inappropriate or illegal content. This problem statement focuses on identifying fake social media profiles and implementing corrective measures to mitigate their effects. The expected outcome is an application software capable of detecting fake social media profiles, aiding crime branches and other investigative agencies in maintaining the integrity of social networks.

Blockchain Technology/Software

CSBT-PS-4: Online Blockchain-Based Certificate Generation and Validation System for Government Organizations

Amidst the proliferation of training programs, the challenge lies in the lack of mechanisms for the validation of digital certificates. This project aims to create a blockchain-based system where custom digital certificates are generated and stored. Users can keep these certificates in a digital locker system, enabling other organizations to validate them. The initiative calls for the utilization of open-source software and blockchain technology to revolutionize the way certificates are issued, stored, and validated.
Expected Output: A blockchain-based certificate generation and validation system, with capabilities for integration into Digital Locker systems.
Users: Government Offices, Students, Industries, and Institutes.

Blockchain Technology/Software

CSBT-PS-5: Analysis and Identification of Malicious Mobile Applications

In today’s world, the ubiquity of mobile applications for various tasks has led to smartphones being overloaded with apps, many of which remain unused over time. This scenario raises the risk of malicious applications operating unnoticed, posing significant security threats. There is a critical need for a mobile app tool that leverages open-source intelligence and threat feeds to identify potential compromises within a smartphone. This tool would scrutinize network communications for suspicious IP addresses, URLs, and inbound connections or packets from dubious applications, enhancing user security.
Technology Track/Category: Blockchain Technology/Software

Blockchain Technology/Software

CSBT-PS-6: Detection of Embedded Malware/Trojan in Hardware Devices Used in Power Sector

As the power systems network evolves with rapidly changing technology, the hardware devices integral to its infrastructure, such as Intelligent Electronic Devices (IEDs), Relay, BCU, Smart Meters, and Remote Terminal Units (RTU), become increasingly intelligent and interconnected. These devices, equipped with fast processing capabilities and the ability to communicate data to control centers or local/zonal SCADA systems, are inherently vulnerable to security threats. The presence of malware, trojans, or other malicious codes within these devices, particularly those with inbuilt firmware and dedicated application programs in constrained memory environments like SoC, Microcontrollers, Microprocessors, DSP, or FPGA-based products, could compromise the integrity of the power system. This challenge seeks to develop methods for rigorous vulnerability assessment and detection of such malicious codes, ensuring the security and reliability of critical power infrastructure and protecting against attacks that could damage processes, systems, the environment, and even human life, including sophisticated zero-day attacks.

Blockchain Technology/Hardware

CSBT-PS-7: Detection of Malware/Trojan in Software Used in Power Sector

With the increasing automation of power system networks and the continual introduction of updated or new software for various operational needs—including SCADA, Head End Systems, Meter Data Management Systems, and Billing Systems—security becomes paramount. These critical software systems, often operated within demilitarized zones, may bypass regular patch updates and penetration testing to maintain uninterrupted service, thereby becoming prime targets for exploitation by hackers using diverse attack vectors. This challenge involves the development of methods to thoroughly scan these software systems for any presence of malicious codes, potentially capable of launching sophisticated cyber-attacks, including zero-day threats, thus ensuring the integrity and security of the power sector’s digital infrastructure.

Blockchain Technology/Software

CSBT-PS-8: Development of a Centralised Information Security Log-Collection Facility or SOC in the Power Sector

With the increasing risk of cyber intrusions and attacks aimed at compromising the power supply system or rendering grid operations insecure, the need for a centralized information security log-collection facility or Security Operation Centre (SOC) has never been more critical. Considering the CEA cybersecurity guidelines for the power sector in 2021, this initiative seeks to develop a SOC that maintains IT and OT networking systems isolated and air-gapped, countering the risk posed by the exploitation of artificial air gaps through social engineering and advanced cyber-attack techniques.
The initiative aims to develop a centralized information security log-collection facility or Security Operation Center (SOC) in the power sector, adhering to CEA cybersecurity guidelines. This development is crucial for keeping IT and OT networking systems isolated and air-gapped, ensuring the security and integrity of critical infrastructure against evolving cyber threats.

Blockchain Technology/Software

CSBT-PS-9: Graphical Password Authentication

The user is required to select some images (let’s say different chocolates) in a specific pattern (for example dairy milk is followed by 5 stars which is in turn followed by KitKat and so on). Next time the user tries to log in, the images would have been shuffled, but the user will be required to follow the same pattern which was used initially. Every time the user will have to use the same sequence while the images are placed in different ways. This type of authentication is difficult to break since neither brute force nor dictionary attacks could breach it. We need techniques that can be easily implemented and provide better results to this process.

Blockchain Technology

CSBT-PS-10: Crypto Currency Investigation Tool with Multi-Blockchain Platform Support

This project seeks to develop investigative tools for cryptocurrencies that offer support across multiple blockchain platforms, enabling the analysis and tracing of transactions in the investigation of financial crimes and frauds involving digital currencies.

Blockchain Technology

CSBT-PS-11: Chat Messenger Decryption Tool

Design a tool to decrypt chat messages from popular messengers like WeChat and DingTalk from cloud or local storage for forensic analysis, aiming to uncover evidence in digital investigations.

Forensics

CSBT-PS-12: Tracing IP Address and Details of Unidentified Participants

Develop a solution for tracing the IP addresses and details of unidentified participants in online academic sessions or webinars, mitigating unauthorized access and enhancing digital security in educational platforms.

Networking

CSBT-PS-13: Speech Emotion Recognition (SER) on Live Calls

Develop a solution that analyzes the voice of callers in real-time during emergency response calls to predict their emotional or mental state. The technology should identify various conditions such as stress, intoxication, or aggression, aiding operators in responding appropriately to each situation.

Artificial Intelligence

CSBT-PS-14: Mesh Network App Detection

Create a technological solution to detect apps like FireChat that utilize Mesh Networking to connect users without cell service, ensuring the secure and responsible use of decentralized communication networks.

Mobile App

CSBT-PS-15: Email Spoofing Detection – Identifying Spoofed Emails

Email spoofing is a prevalent cyber attack method where a hacker manipulates an email to appear as if it’s sent from a trusted source, a tactic commonly used in phishing and spam attacks. These attacks often include embedded links to phishing sites aiming to steal sensitive information or login credentials, contain malware-laden attachments, or use social engineering techniques for financial fraud. The essence of spoofing involves compromising an SMTP server to alter the ‘From’, ‘Reply-To’, and ‘Return-Path’ fields, making the phishing emails seem legitimate. The challenge is to develop a forensic solution that can detect such spoofed emails, effectively identifying and mitigating the risks posed by these deceptive practices.

Forensics

CSBT-PS-16: Online Tracking Mechanism for Digital Media Piracy

An online media tracking mechanism that may read information on webpages, and identify possible instances of piracy on digital media may be developed. Such a system may be developed and operated in collaboration with the Indian Media & Entertainment industry. At the input, content producers may feed various details and metadata related to a particular piece of copyright content. This information may be compared with the information tracked through the online mechanism to identify and flag potential cases of copyright violation. With final confirmation from the broadcasters, further tracking of a concerned website may be undertaken to identify it as an infringing website. Over a period of time, a dynamic Infringing Website List (IWL) may be developed and maintained. The system may send notifications to online advertising intermediaries (such as Google, Facebook, Amazon, etc.) for blacklisting of such websites (and their IP addresses) from receiving any future ads, thereby discouraging online piracy in India.

Social Media

CSBT-PS-17: Fake News Detection System

Develop a technological solution that can track and trace the origin of fake news using official sources as a filter, with mechanisms to mitigate the spread by populating the inboxes of spreaders with authenticated content, enhancing the integrity of information on digital platforms.

Artificial Intelligence

CSBT-PS-18: Women Safety Mobile App

Design and develop a women’s safety app that senses danger and triggers an SOS alert with location details based on multimodal data such as audio, video, and motion detection, ensuring immediate assistance even when the user is unable to interact with their device.

Mobile App

CSBT-PS-19: People Safety App for Real-time Malicious/Fraud Indicator Detection

Create an app that flags malicious or fraudulent indicators in real-time, offering users protection and awareness against potential scams and cyber threats.

Mobile App

CSBT-PS-20: Spam Alert System Based on Crowd-Sourced Verification

Design and develop a crowd-sourcing based solution that can analyse and verify the source of any incoming call, SMS and Email based on the inputs from the end-users. The solution should be able to classify, whether the source is genuine or spam. Also, the solution should be able to generate a risk score for incoming calls, SMS and Emails, based on the crowd-sourced input

Artificial Intelligence

CSBT-PS-21: Dark Web Crawler for Crime Intelligence

Design and develop an AI-enabled technological solution for actionable Crime Intelligence from the Deep and Dark Web including but not limited to child pornography, weapons, drugs etc. The solution should have the capability to raise demands for additional information from clear-net and proprietary databases viz. TSPs/ISPs for attempting correlation and attribution.

Artificial Intelligence

CSBT-PS-22: AI-Enabled Phishing Detection Solution

Develop a technological solution for AI-enabled detection of phishing links across web pages, emails, social media, and instant messenger apps, aiming to identify the source of phishing attacks and alert users to protect them from cyber fraud.

Artificial Intelligence

CSBT-PS-23: Software Tool to Aid Search and Rescue of an Aircraft

In the event of lost contact with an aircraft, accurately pinpointing the crash site is crucial for rescue operations. This project aims to develop a software tool that utilizes the last known position of the aircraft to calculate and plot the search area, potentially saving lives by reducing search times.

Mobile App

CSBT-PS-24: Assisting Farmers with Data from the Meteorological Department

Providing farmers with timely and accurate weather updates is vital for agricultural planning and risk management. This initiative aims to create a user-friendly mobile application that delivers meteorological data directly to farmers, alerting them to upcoming weather conditions that could impact their crops, and enabling them to make informed decisions.

Mobile App

CSBT-PS-25: Phygital Financial Education Platform

Create a simple yet engaging phygital (physical+digital) or digital platform to improve understanding of basic financial concepts and equip women and girls across Asia. This tool or experience should bring financial education to great scale, enabling more informed financial choices regarding saving, investing, insuring, borrowing, and more, while taking into account different language and vernacular capabilities.

Education/Technology

CSBT-PS-26: Carbon Emissions Education Platform

Create a platform for consumers to be better educated about carbon emissions and major contributors to rising carbon footprint. Incorporate gamification to encourage consumers to reduce their carbon footprint in a way that’s educational and fun, motivating direct and indirect emissions reduction.

Environmental Awareness

CSBT-PS-27: Coastal Flooding Awareness App

Develop an engaging web platform or mobile app that enhances public awareness of coastal flooding issues. Integrate GIS data and infrastructure information to provide users with scenario analysis of flood risks, encouraging community participation in data collection and flood risk mapping.

Disaster Management

CSBT-PS-28: Food Rescue and Redistribution Platform

Create a platform connecting food suppliers with local food banks and non-profit organizations. Use data analytics to optimize rescue routes and minimize transportation costs, reducing food wastage and ensuring efficient distribution to communities in need.

Sustainability

CSBT-PS-29: MSME Trade Connectivity Platform

Create a secured and automated platform for the accreditation, certification, and validation of MSMEs to enhance trade connectivity. The platform should establish trust and streamline cross-border and overseas trade.

Trade and Commerce

CSBT-PS-30: Cybersecurity Learning App for Kids

Develop a game-based digital learning app to teach kids about cybersecurity. The app should be engaging and instructive, providing essential knowledge about online safety in a format accessible to younger audiences.

Education/Cybersecurity

CSBT-PS-31: create a simple yet engaging
phygital (physical+digital)/digital platform, tool or improve understanding of basic financial concepts and equip women and girls across asia.

this tool or experience that brings to life financial education at great scale in order to improve understanding of basic financial concepts and equip women and girls across Asia to make more informed financial choices regarding saving, investing, insuring, borrowing and more.Financial fraud and misconduct are one of the biggest issues in safety and soundness of the Financial Sector. Financial institutions have expensive and onerous processes to verify transactions for potential insider trading.The platform/tool/experience should also take into account different language/vernacular capabilities.

Blockchain Technology

CSBT-PS-32: create a platform for consumers to be better educated about carbon emissions and the major contributors to rising carbon footprint in the world.

The solution would not only educate, but possibly incorporate gamification elements to encourage consumers to reduce their carbon footprint. This software app should not only be educational, but fun as well to encourage consumers and/or family units to be more conscious of their carbon footprint while taking necessary steps to reduce direct and indirect carbon emissions. Once consumer adoption has taken off,

Blockchain Technology

CSBT-PS-33: Develop an engaging web platform or mobile app that improves public awareness of coastal flooding issues.

Integrate GIS data, infrastructure
information to provide users and urban planners with different scenarios of flood risks. Invite users to contribute to data collection and analysis by reporting flood events, photo sharing or participating in flood risk mapping initiatives. This software app should be able to provide users with
basic scenario analysis of flood risk scenarios based on different levels of sea level rise. Which areas are most vulnerable and what other areas will be vulnerable if sea levels rise further? Invite users to crowdsource
data collection on flooding through photo sharing and/or other data collection
initiatives.As global warming continues, sea levels are projected to rise, leading to an increased risk of coastal flooding in many cities worldwide. In Asia, several cities are particularly vulnerable to this threat due to their lowlying topography, large populations, and insufficient infrastructure.

Cyber Security

CSBT-PS-34: Create a platform that connects food suppliers (restaurants, grocery stores, catering services) with local food banks and non-profit organisations

The platform should use data analytics to optimise food rescue routes, minimize transportation costs, and maximize benefits to communities in need. Instead of throwing away food that is close to expiry, or has been cooked but not consumed, can we organise rescue efforts for these food items so that they can be redistributed to those in need? Collection and redistribution logistics are key, and the app should optimise timing and route transport so as to minimize transport costs while ensuring food does not sit around and spoil while waiting to be redistributed to those in need. Transport distances also cannot be too far for the same reasons.Everyday, tonnes of food in urban cities is thrown away because they could not be consumed before expiry. Food wastage not only has a big impact on the environment, but also could have been better used to feed communities in need.

Cyber Security

CSBT-PS-35: Game Based Digital learning App to teach kids about cyber security.

Game Based Digital learning App to teach kids about cyber security.

Blockchain Technology/software

CSBT-PS-36: Innovate Your Solution in Cybersecurity and Blockchain

Challenge yourself to identify emerging threats or opportunities within cybersecurity and blockchain technology. Propose a groundbreaking solution that addresses a real-world problem, enhances digital security, promotes privacy, or leverages blockchain for novel applications. Whether it’s developing a new security protocol, creating a decentralized app (dApp) for public service, or innovating in digital identity protection, we invite you to bring your vision to life.
Note: Please forward any problem statements you wish to be considered for shortlisting to hacksavvy@mgit.ac.in. The committee will review and finalize the selections.

Open Category