GDPR compliance assessment for cross-border personal data transfers in android apps

DS Guamán, JM Del Alamo, JC Caiza - IEEE Access, 2021 - ieeexplore.ieee.org
The pervasiveness of Android mobile applications and the services they support allow the
personal data of individuals to be collected and shared worldwide. However, data protection …

[HTML][HTML] Automated GDPR compliance assessment for cross-border personal data transfers in android applications

DS Guamán, D Rodriguez, JM del Alamo, J Such - Computers & Security, 2023 - Elsevier
Abstract The General Data Protection Regulation (GDPR) aims to ensure that all personal
data processing activities are fair and transparent for the European Union (EU) citizens …

Analyzing android taint analysis tools: FlowDroid, Amandroid, and DroidSafe

J Zhang, Y Wang, L Qiu, J Rubin - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Numerous static taint analysis techniques have recently been proposed for identifying
information flows in mobile applications. These techniques are often optimized and …

M-string segmentation: a refined abstract domain for string analysis in C programs

A Cortesi, M Olliaro - 2018 International Symposium on …, 2018 - ieeexplore.ieee.org
We present a refined segmentation abstract domain for the analysis of strings in the C
programming language, properly extending the parametric segmentation approach to array …

[HTML][HTML] From CIL to Java bytecode: Semantics-based translation for static analysis leveraging

P Ferrara, A Cortesi, F Spoto - Science of Computer Programming, 2020 - Elsevier
A formal translation of CIL (ie,. Net) bytecode into Java bytecode is introduced and proved
sound with respect to the language semantics. The resulting code is then analyzed with …

Cil to java-bytecode translation for static analysis leveraging

P Ferrara, A Cortesi, F Spoto - Proceedings of the 6th Conference on …, 2018 - dl.acm.org
A formal translation of CIL (ie,. Net) bytecode into Java bytecode is introduced and proved
sound with respect to the language semantics. The resulting code is then analyzed with …

Automatic Note Recognition and Generation of MDL and MML using FFT

H Li, H You, X Fei, M Yang, KM Chao… - 2018 IEEE 15th …, 2018 - ieeexplore.ieee.org
Increase in the number of online released music tracks means there is a need to improve the
performance of existing Music Information Retrieval (MIR) systems, eg, music search engine …

Prevention of data leakage due to implicit information flows in android applications

H Inayoshi, S Kakei, E Takimoto… - 2019 14th Asia Joint …, 2019 - ieeexplore.ieee.org
Dynamic Taint Analysis (DTA) technique has been developed for analysis and
understanding behavior of Android applications and privacy policy enforcement. Meanwhile …

Wifi-related energy consumption analysis of mobile devices in a walkable area by abstract interpretation

E Eugenio, A Cortesi - … , ICDCIT 2017, Bhubaneswar, India, January 13-16 …, 2017 - Springer
The huge increase in the usage of mobile devices has led to the need of sophisticated
optimization techniques in order to minimize energy wastage. In this paper we analyze …

Data-oriented instrumentation against information leakages of Android applications

C Sun, P Feng, T Li, J Ma - 2017 IEEE 41st Annual Computer …, 2017 - ieeexplore.ieee.org
As one of the most prominent threat, information leakages usually take sensitive data from
some private sources and improperly release the data through malicious or misused method …