Information security in smartphones:
an analysis on scaling permissions in android system
Keywords:
ANDROID OS, Backdoor, phishing, Rootkits, Information SecurityAbstract
This article aims to explain how permissions work on Android devices, based on theoretical studies and official documentation available to the public. The research addresses how applications can exploit system vulnerabilities to obtain third-party permissions and access restricted user data.
The methodology used includes the analysis of theoretical studies and official documentation, highlighting ways in which third-party applications can take advantage of these vulnerabilities. Additionally, the article demonstrates the importance of best installation practices to ensure device security.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Portugues

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
A Revista Brasileira em Tecnologia da Informação utiliza a licença do Creative Commons (CC), preservando assim, a integridade dos artigos em ambiente de acesso aberto.