Wednesday, January 19 • 6:30pm - 8:30pm
Cyber Security Applications for Smart Phone: Recognizing Operating Code Pattern Differential among Users

Sign up or log in to save this to your schedule and see who's attending!

Smart phones such as Apple Inc.’s iPhone, Google Inc.’s Android phones, and Blackberry devices have seen a recent rise in sales in recent years as consumers are exchanging their older and inefficient cellular devices for these new high-tech smart phones. As smart phones are becoming ubiquitous in daily life, security threats are emerging as well. With personal data being stored and location becoming prominent, hackers are becoming inclined to steal this valuable information. Security breaches now being more common on smart phones, a security application is needed to circumvent any attacks and protect the user. A security application has been constructed for a smart phone to address security issues. The application was programmed to function as a real-time integrity application. This application was given a filter for a user-account-control function for users to allow any program changes before they occur. Analysis results show the security application controlled noticeable program changes to a user's smart phone. However, the application cannot yet detect minute program changes which are the largest threats for a smart phone. With continued program changes the security application is projected to detect even the smallest of changes within filter levels to protect smart phones.


Wednesday January 19, 2011 6:30pm - 8:30pm
Glass Oaks Main Floor - Side Wing