Information security in smartphones:

an analysis on scaling permissions in android system

Authors

Keywords:

ANDROID OS, Backdoor, phishing, Rootkits, Information Security

Abstract

This article aims to explain how permissions work on Android devices, based on theoretical studies and official documentation available to the public. The research addresses how applications can exploit system vulnerabilities to obtain third-party permissions and access restricted user data.

The methodology used includes the analysis of theoretical studies and official documentation, highlighting ways in which third-party applications can take advantage of these vulnerabilities. Additionally, the article demonstrates the importance of best installation practices to ensure device security.

Published

2024-12-30

How to Cite

AZEVEDO SOUSA, D. E. A. S.; MACHACA, R.; CODO, F. Information security in smartphones: : an analysis on scaling permissions in android system. Portugues, [S. l.], v. 6, n. 2, p. 3 - 13, 2024. Disponível em: https://www.fateccampinas.com.br/rbti/index.php/fatec/article/view/161. Acesso em: 17 aug. 2025.

Issue

Section

Artigos