Access your Pro+ Content below.
Sleeping Android: the danger of dormant permissions
Sponsored by ComputerWeekly.com
A weakness in the permissions architecture of the Android platform means that apps could gain access to functionality without a user’s knowledge or consent, leaving them open to exploitation or abuse by attackers. Changes to the way the Android platform authorises permission requests could compromise the security of unwary users.
Table Of Contents
- Permission architecture basics
- Permission architecture evolution
- When evolution exposes weakness
Access this CW+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.