1 de 1 copias disponibles
Analysis of information flows in android Tools for compliance with accountability
Applications present on mobile phones can manage data such as photos, emails or calendar, can access certain data generated by integrated sensors in the device or connected to it, such as geo-localisation of the user's vital signs and certain identifiers used by the hardware, operating system, services and other applications, what is called the device's digital signature (see the study Fingerprint or Digital Device Fingerprint published by the AEPD). These personal data may be processed internally by the applications, although they may also be communicated internally to other applications within the same device or to external entities (e.g. a data analysis server).
CONTENTS
I. Executive Summary.
II. Introduction.
-Objectives and Scope.
III. Privacy and Personal Data Protection in Android Applications:
-Android Application Environment.
-Privacy and Personal Data Protection in Android Applications.
-Declaration of privacy on Android applications.
IV. Data Flow Detection Techniques.
-Static analysis techniques for code.
-Identification of sources and exit points.
-Identification tools for sources and exit points.
-Static analysis of information flow.
-Tools for flow analysis.
-Dynamic analysis techniques.
-Event generation techniques.
-Traffic analysis techniques.
-Traffic interception techniques.
-Traffic decryption techniques.
-Information analysis techniques
-Tools.
V. Conclusions.
VI. References.
- Formato: PDF
- Número de páginas: 25
- Tamaño: 496 Kb.
Applications present on mobile phones can manage data such as photos, emails or calendar, can access certain data generated by integrated sensors in the device or connected to it, such as geo-localisation of the user's vital signs and certain identifiers used by the hardware, operating system, services and other applications, what is called the device's digital signature (see the study Fingerprint or Digital Device Fingerprint published by the AEPD). These personal data may be processed internally by the applications, although they may also be communicated internally to other applications within the same device or to external entities (e.g. a data analysis server).
CONTENTS
I. Executive Summary.
II. Introduction.
-Objectives and Scope.
III. Privacy and Personal Data Protection in Android Applications:
-Android Application Environment.
-Privacy and Personal Data Protection in Android Applications.
-Declaration of privacy on Android applications.
IV. Data Flow Detection Techniques.
-Static analysis techniques for code.
-Identification of sources and exit points.
-Identification tools for sources and exit points.
-Static analysis of information flow.
-Tools for flow analysis.
-Dynamic analysis techniques.
-Event generation techniques.
-Traffic analysis techniques.
-Traffic interception techniques.
-Traffic decryption techniques.
-Information analysis techniques
-Tools.
V. Conclusions.
VI. References.
- Formato: PDF
- Número de páginas: 25
- Tamaño: 496 Kb.
- Lectura offline protegida
- Lectura online