calls and SMS, unauthorized camera and
microphone activation prevention.
4 CONCLUSIONS
The proposed antivirus can detect hazardous
applications and programs that lead to malfunction,
incorrect system work, device speeding down, data
loss or corruption, system alert. It is able to protect
the user from applications recording conversations,
both personal and telephone, and does not allow spy
applications to secretly transmit data and activate
programs. Antivirus software monitors camera
activation and warns the user when the camera is on
without displaying on the screen corresponding
information. This feature is not available in the
existing well-known antivirus software.
The work is underway to improve the
effectiveness and speed of the proposed antivirus,
diversify its functions and carry out additional tests
and simulations confirming security software
efficiency.
REFERENCES
Wang Guolu; Qiu Kaijin; Xu hai; Chen Yao. 2013. The
design and implementation of a gravity sensor-based
mobile phone for the blind. 4th IEEE International
Conference on Software Engineering and Service
Science (ICSESS). Pages: 570 – 574.
Dohee Kim; Eunji Lee; Sungyong Ahn; Hyokyung Bahn.
2013. Improving the storage performance of
smartphones through journaling in non-volatile
memory. IEEE Transactions on Consumer
Electronics, (Volume: 59, Issue: 3). Pages: 556 – 561.
Xing, Min; Xiang, Siyuan; Cai, Lin. 2014. A Real-Time
Adaptive Algorithm for Video Streaming over
Multiple Wireless Access Networks. IEEE Journal on
Selected Areas in Communications (Volume: 32,
Issue: 4). Pages: 795 – 805.
Amalan, D.; Jurangpathy, B.Z.; Kodituwakku, S.D.;
Luckshan, M.A.; Weerakkody, P.K.; De Silva,
K.P.D.H. 2013. Voice active mobile browser for
windows phone 7 (A browser that helps visually
impaired people). IEEE Global Humanitarian
Technology Conference: South Asia Satellite (GHTC-
SAS). Pages: 144 – 148.
Szakacs-Simon, P.; Moraru, S.A.; Perniu, L. 2013.
Android application developed to extend health
monitoring device range and real-time patient
tracking. IEEE 9th International Conference on
Computational Cybernetics (ICCC). Pages: 171 – 175.
Jaehyun Lee; Junhyung Ahn; Yoonji Lee; Chulyun Kim.
2013. Implementation of Semantic Directory Service
on Image Gallery Application of Mobile Devices.
International Conference on Information Science and
Applications (ICISA). Pages: 1 – 2.
Mikhaylov Dmitry, Zhukov Igor, Starikovskiy Andrey,
Kharkov Sergey, Tolstaya Anastasia, Zuykov
Alexander. 2013. Review of Malicious Mobile
Applications, Phone Bugs and other Cyber Threats to
Mobile Devices. Proceedings of 2013 5th IEEE
International Conference on Broadband Network &
Multimedia Technology (5th IEEE IC-BNMT 2013),
November 17-19th 2013 Guilin, China. Pages 302-
305.
Zhukov Igor, Mikhaylov Dmitry, Starikovskiy Andrey,
Dmitry Kuznetsov, Tolstaya Anastasia, Zuykov
Alexander. 2013. Security Software Green Head for
Mobile Devices Providing Comprehensive Protection
from Malware and Illegal Activities of Cyber
Criminals. International Journal of Computer Network
and Information Security (IJCNIS) Vol. 5, No. 5,
April 2013. Рages 1-8.
Patrick Northcraft. 2014. Android: The Most Popular OS
in the World. AndroidHeadlines.com, February 15,
2014. URL: http://www.androidheadlines.com/2014/
02/android-popular-os-world.html.
Shahriar, Hossain; North, Sarah; Mawangi, Edward.
Testing of Memory Leak in Android Applications.
2014. IEEE 15th International Symposium on High-
Assurance Systems Engineering (HASE). Pages: 176 –
183.
Sbirlea, D.; Burke, M.G.; Guarnieri, S.; Pistoia, M.;
Sarkar, V. 2013. Automatic detection of inter-
application permission leaks in Android applications.
IBM Journal of Research and Development (Volume:
57, Issue: 6), Nov.-Dec. 2013. Pages: 10:1 - 10:12.
Taenam Cho; Jae-Hyeong Kim; Hyeok-Ju Cho; Seung-
Hyun Seo; Seungjoo Kim. 2013. Vulnerabilities of
android data sharing and malicious application to
leaking private information. Fifth International
Conference on Ubiquitous and Future Networks
(ICUFN). Pages: 37 – 42.
Mulliner, C.; Liebergeld, S.; Lange, M.; Seifert, J.-P.
2012. Taming Mr Hayes: Mitigating signaling based
attacks on smartphones. 42nd Annual IEEE/IFIP
International Conference on Dependable Systems and
Networks (DSN). Pages: 1 – 12.
Stirparo, Pasquale; Fovino, Igor Nai; Taddeo, Marco;
Kounelis, Ioannis. 2013. In-memory credentials
robbery on android phones. World Congress on
Internet Security (WorldCIS). Pages: 88 – 93.
Woo Bong Cheon; Keon il Heo; Won Gyu Lim; Won
Hyung Park; Tai Myoung Chung. 2011. The New
Vulnerability of Service Set Identifier (SSID) Using
QR Code in Android Phone. International Conference
on Information Science and Applications (ICISA).
Pages: 1 – 6.
Miller, C. 2011. Mobile Attacks and Defense. IEEE
Security & Privacy, (Volume: 9, Issue: 4), July-Aug.
2011. Pages: 68 – 70.
Barrere, M.; Hurel, G.; Badonnel, R.; Festor, O. 2013. A
probabilistic cost-efficient approach for mobile
DevelopmentoftheProtectionSystemAgainstMaliciousSoftware
169