Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals

Full Text (PDF, 181KB), PP.1-8

Views: 0 Downloads: 0

Author(s)

Zhukov Igor 1,* Mikhaylov Dmitry 1 Starikovskiy Andrey 1 Kuznetsov Dmitry 1 Tolstaya Anastasia 1 Zuykov Alexander 1

1. National Research Nuclear University ―MEPhI‖, Moscow, Russia

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.05.01

Received: 14 Jun. 2012 / Revised: 5 Oct. 2012 / Accepted: 9 Jan. 2013 / Published: 8 Apr. 2013

Index Terms

Security software Green Head, malware, wiretapping, spam, cyber criminal

Abstract

This paper deals with the description of the threats to mobile devices and suggests the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects personal smartphones of majority of brands from spam, viruses and unauthorized access. It is an innovative software product ensuring information security of mobile phones from all currently existing threats that today does not have any full analogs. Green Head security software warns the user about wiretapping, which keeps professional and personal confidential information intact. The developed security software is universal for people using mobile phones in professional and personal life because any stored information is protected from various attacks.

Cite This Paper

Zhukov Igor, Mikhaylov Dmitry, Starikovskiy Andrey, Kuznetsov Dmitry, Tolstaya Anastasia, Zuykov Alexander, "Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.5, pp.1-8, 2013. DOI:10.5815/ijcnis.2013.05.01

Reference

[1]Amanda Wills. The World Will Soon Have More Phones Than Humans. 2012. URL: http://mashable.com/2012/07/19/more-phones-than-humans.
[2]Zhukov Igor, Mikhaylov Dmitry, Ivashko Andrey. Mobile phone protection from attacks. Moscow. FOILIS, 2011. -192 pages.
[3]A.G. Beltov, I.Yu. Zhukov, A.V. Novitskiy, D.M. Mikhaylov, A.V. Starikovskiy. Security issues of mobile devices. Safety of information technologies. "Mobile communication security ", 2012, №2. P 5-7.
[4]Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Albayrak, S., Yildizli, C., "Smartphone malware evolution revisited: Android next target?", Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, On page(s): 1–7.
[5]Zhukov Igor, Ivashko Andrey, Mikhaylov Dmitry, Starikovskiy Andrey. Mobile technologies. Moscow: INFRA-M, 2012. - 206 pages.
[6]A.G. Beltov, I.Yu. Zhukov, D.M. Mikhaylov. Protection of mobile phones from attacks. Methods and tools of information security: 21st Scientific Conference June 24-29, 2012. - St. Petersburg, Polytechnic. University Press, 2012. - 191 p. P 43-44.
[7]Marco Cova, Christopher Kruegel, and Giovanni Vigna. There is No Free Phish: An Analysis of "Free" and Live Phishing Kits. 2nd USENIX Workshop on Offensive Technologies, 2008. URL: http://static.usenix.org/event/woot08/tech/full_papers/cova/cova_html.
[8]Phishing. Auburn University. URL: http://www.auburn.edu/oit/phishing.
[9]G.A. Evropeytsev, M.I. Froimson, G.A. Urvanov. Attacks on mobile phones using SMS-spam. Safety of information technologies. "Mobile communication security ", 2012, №2. P 14-16.
[10]A.V. Zuykov, D.M. Mikhaylov, A.V. Starikovskiy, M.I. Froimson. Wiretapping of mobile subscribers. Safety of information technologies. "Mobile communication security ", 2012, №2. P 11-13.
[11]Pikhtulov A.A., Mikhaylov D.M. Heuristic features of Bluetooth-virus for mobile devices. "Science and modernity - 2011": materials of XIII International Scientific Conference: in 3 parts. Part 2 / Ed. S.S. Chernova. – Novosibirsk: State Technical University, 2011. - 278 p. P 233-237.
[12]Xia Wei, Li Zhao-hui, Chen Zeng-Qiang, Yuan Zhu-zhi, "The Influence of Smart Phone's Mobility on Bluetooth Worm Propagation", Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007.
[13]T.R. Khabibullin, A.G. Beltov, I.Yu. Zhukov, A.V. Zuykov, A.S. Smirnov. Vulnerability of software for mobile phones and secure programming techniques. Safety of information technologies. "Mobile communication security ", 2012, №2. P 32-35.
[14]M.I. Froimson, A.M. Rapetov, N.V. Sychev. SMS-disorientation of mobile phone users. Safety of information technologies. "Mobile communication security ", 2012, №2. P 17-21.
[15]Android Extended Lead While Apple iOS Market Share Growth Paused. Gartner Says Worldwide Sales of Mobile Phones Declined 2.3 Percent in Second Quarter of 2012. Egham, UK, Gartner, August 14, 2012. URL: http://www.gartner.com/newsroom/id/2120015.
[16]C. Collberg, C. Thomborson. Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. Technical Report 2000-03. Department of Computer Science, University of Arizona, 2000.
[17]Sheng Liang, The Java Native Interface Programmer's Guide and Specification, Sun Microsystems, Inc. May 1999.
[18]David Ehringer, The Dalvik virtual machine architecture. Techn. report (March 2010), 2010 - davidehringer.com.
[19]Komatineni S., McLean D., Heshimi S. Google Android: Mobile Programming / / Pro Android 2. - 1st ed. - St. Petersburg, 2011. - 736 p.