Development of the Protection System Against Malicious Software

D. M. Mikhaylov, A. V. Zuykov, M. I. Froimson, A. S. Smirnov

2014

Abstract

Nowadays mobile phone manufacturers offer their customers not only devices for calling and sending SMSmessages, but also multi-functional smartphones with much broader capability. Mobile phones are used to access the Internet, for e-mailing, social networking, finding phone owner`s location and routing, etc. Due to its multiple functionalities, a smartphone can store a lot of data that may be breached by theft or data leakage. This article focuses on development of security software for mobile devices able to detect malicious software and infected files on the device as well as to protect the user from applications recording personal conversations, secretly transmitting data and activating programs. Antivirus software monitors secret camera activation warning the user. The paper also provides the comparison of the proposed security software with popular antiviruses: Kaspersky Mobile Security, Dr.Web, ESET, Norton Antivirus, etc.

References

  1. Wang Guolu; Qiu Kaijin; Xu hai; Chen Yao. 2013. The design and implementation of a gravity sensor-based mobile phone for the blind. 4th IEEE International Conference on Software Engineering and Service Science (ICSESS). Pages: 570 - 574.
  2. Dohee Kim; Eunji Lee; Sungyong Ahn; Hyokyung Bahn. 2013. Improving the storage performance of smartphones through journaling in non-volatile memory. IEEE Transactions on Consumer Electronics, (Volume: 59, Issue: 3). Pages: 556 - 561.
  3. Xing, Min; Xiang, Siyuan; Cai, Lin. 2014. A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks. IEEE Journal on Selected Areas in Communications (Volume: 32, Issue: 4). Pages: 795 - 805.
  4. Amalan, D.; Jurangpathy, B.Z.; Kodituwakku, S.D.; Luckshan, M.A.; Weerakkody, P.K.; De Silva, K.P.D.H. 2013. Voice active mobile browser for windows phone 7 (A browser that helps visually impaired people). IEEE Global Humanitarian Technology Conference: South Asia Satellite (GHTCSAS). Pages: 144 - 148.
  5. Szakacs-Simon, P.; Moraru, S.A.; Perniu, L. 2013. Android application developed to extend health monitoring device range and real-time patient tracking. IEEE 9th International Conference on Computational Cybernetics (ICCC). Pages: 171 - 175.
  6. Jaehyun Lee; Junhyung Ahn; Yoonji Lee; Chulyun Kim. 2013. Implementation of Semantic Directory Service on Image Gallery Application of Mobile Devices. International Conference on Information Science and Applications (ICISA). Pages: 1 - 2.
  7. Mikhaylov Dmitry, Zhukov Igor, Starikovskiy Andrey, Kharkov Sergey, Tolstaya Anastasia, Zuykov Alexander. 2013. Review of Malicious Mobile Applications, Phone Bugs and other Cyber Threats to Mobile Devices. Proceedings of 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology (5th IEEE IC-BNMT 2013), November 17-19th 2013 Guilin, China. Pages 302- 305.
  8. Zhukov Igor, Mikhaylov Dmitry, Starikovskiy Andrey, Dmitry Kuznetsov, Tolstaya Anastasia, Zuykov Alexander. 2013. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. International Journal of Computer Network and Information Security (IJCNIS) Vol. 5, No. 5, April 2013. ?ages 1-8.
  9. Patrick Northcraft. 2014. Android: The Most Popular OS in the World. AndroidHeadlines.com, February 15, 2014. URL: http://www.androidheadlines.com/2014/ 02/android-popular-os-world.html.
  10. Shahriar, Hossain; North, Sarah; Mawangi, Edward. Testing of Memory Leak in Android Applications. 2014. IEEE 15th International Symposium on HighAssurance Systems Engineering (HASE). Pages: 176 - 183.
  11. Sbirlea, D.; Burke, M.G.; Guarnieri, S.; Pistoia, M.; Sarkar, V. 2013. Automatic detection of interapplication permission leaks in Android applications. IBM Journal of Research and Development (Volume: 57, Issue: 6), Nov.-Dec. 2013. Pages: 10:1 - 10:12.
  12. Taenam Cho; Jae-Hyeong Kim; Hyeok-Ju Cho; SeungHyun Seo; Seungjoo Kim. 2013. Vulnerabilities of android data sharing and malicious application to leaking private information. Fifth International Conference on Ubiquitous and Future Networks (ICUFN). Pages: 37 - 42.
  13. Mulliner, C.; Liebergeld, S.; Lange, M.; Seifert, J.-P. 2012. Taming Mr Hayes: Mitigating signaling based attacks on smartphones. 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Pages: 1 - 12.
  14. Stirparo, Pasquale; Fovino, Igor Nai; Taddeo, Marco; Kounelis, Ioannis. 2013. In-memory credentials robbery on android phones. World Congress on Internet Security (WorldCIS). Pages: 88 - 93.
  15. Woo Bong Cheon; Keon il Heo; Won Gyu Lim; Won Hyung Park; Tai Myoung Chung. 2011. The New Vulnerability of Service Set Identifier (SSID) Using QR Code in Android Phone. International Conference on Information Science and Applications (ICISA). Pages: 1 - 6.
  16. Miller, C. 2011. Mobile Attacks and Defense. IEEE Security & Privacy, (Volume: 9, Issue: 4), July-Aug. 2011. Pages: 68 - 70.
  17. Barrere, M.; Hurel, G.; Badonnel, R.; Festor, O. 2013. A probabilistic cost-efficient approach for mobile security assessment. 9th International Conference on Network and Service Management (CNSM). Pages: 235 - 242.
  18. Cozzette, A.; Lingel, K.; Matsumoto, S.; Ortlieb, O.; Alexander, J.; Betser, J.; Florer, L.; Kuenning, G.; Nilles, J.; Reiher, P. 2013. Improving the security of Android inter-component communication. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Pages: 808 - 811.
  19. Al-Saleh, M.I.; Espinoza, A.M.; Crandall, J.R. 2013. Antivirus performance characterization: system-wide view. IET Information Security, (Volume: 7, Issue: 2). Pages: 126 - 133.
  20. Bläsing, T.; Batyuk, L.; Schmidt, A.-D.; Camtepe, S.A.; Albayrak, S. 2010. An Android Application Sandbox system for suspicious software detection. 5th International Conference on Malicious and Unwanted Software (MALWARE). Pages: 55 - 62.
  21. Pieterse, H.; Olivier, M.S. 2013. Security steps for smartphone users. Information Security for South Africa. Pages: 1 - 6.
  22. Fu-Hau Hsu; Min-Hao Wu; Chang-Kuo Tso; Chi-Hsien Hsu; Chieh-Wen Chen. 2012. Antivirus Software Shield Against Antivirus Terminators. IEEE Transactions on Information Forensics and Security, (Volume: 7, Issue: 5). Pages: 1439 - 1447.
  23. Chia-Mei Chen, Ya-Hui Ou. 2011. Secure mechanism for mobile web browsing. IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS). Pages: 924 - 928.
  24. Kasama, T.; Yoshioka, K.; Inoue, D.; Matsumoto, T. 2012. Malware Detection Method by Catching Their Random Behavior in Multiple Executions. IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT). Pages: 262 - 266.
  25. Dube, T.E.; Raines, R.A.; Grimaila, M.R.; Bauer, K.W.; Rogers, S.K. 2013. Malware Target Recognition of Unknown Threats. IEEE Systems Journal, (Volume: 7, Issue: 3). Pages: 467 - 477.
  26. Hsiang-Yuan Hsueh; Kun-Fu Huang; Wei-Ming Wu; Chih-Lin Li. 2013. Evaluating the risk of Android application: Design and implementation of static analysis system. 6th International Conference on Advanced Infocomm Technology (ICAIT). Pages: 236 - 237.
  27. Batyuk, L.; Herpich, M.; Camtepe, S.A.; Raddatz, K.; Schmidt, A.-D.; Albayrak, S. 2011. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications. 6th International Conference on Malicious and Unwanted Software (MALWARE). Pages: 66 - 72.
  28. Yan Ma; Sharbaf, M.S. 2013. Investigation of Static and Dynamic Android Anti-virus Strategies. Tenth International Conference on Information Technology: New Generations (ITNG). Pages: 398 - 403.
  29. William Enck, Peter Gilbert, Byung-Gon Chun. 2010. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Pages: 1 - 15.
  30. Android operating system architecture. 2011. Androidshark. URL: http://android-shark.ru/arhitekturaoperatsionnoy-sistemyi-android.
  31. Michael Lawrence. 2012. Tutorial How to Install Games on Galaxy Mini. Tutorial For Android. URL: http://tutorialfor-android.blogspot.ru/2012/05/tutorialhow-to-install-games-on-galaxy.html.
  32. Trojan Android.SmsSend.186.origin. 2012. IT-sector. URL: http://it-sektor.ru/android.smssend.186.origintroyan-otpravlyauschiyi-platnye-smssoobscheniya.html.
  33. Mobile Spy. 2013. Top 10 Spy Software. URL: http://top10spysoftware.com/review/mobilespy.
Download


Paper Citation


in Harvard Style

Mikhaylov D., Zuykov A., Froimson M. and Smirnov A. (2014). Development of the Protection System Against Malicious Software . In Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2014) ISBN 978-989-758-050-5, pages 161-170. DOI: 10.5220/0005060201610170


in Bibtex Style

@conference{kmis14,
author={D. M. Mikhaylov and A. V. Zuykov and M. I. Froimson and A. S. Smirnov},
title={Development of the Protection System Against Malicious Software},
booktitle={Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2014)},
year={2014},
pages={161-170},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005060201610170},
isbn={978-989-758-050-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Knowledge Management and Information Sharing - Volume 1: KMIS, (IC3K 2014)
TI - Development of the Protection System Against Malicious Software
SN - 978-989-758-050-5
AU - Mikhaylov D.
AU - Zuykov A.
AU - Froimson M.
AU - Smirnov A.
PY - 2014
SP - 161
EP - 170
DO - 10.5220/0005060201610170