Diccionario panhispánico del español jurídico

1 de 1 copias disponibles

Analysis of information flows in android Tools for compliance with accountability

por Agencia Española de Protección de Datos

Libro

Applications present on mobile phones can manage data such as photos, emails or calendar, can access certain data generated by integrated sensors in the device or connected to it, such as geo-localisation of the user's vital signs and certain identifiers used by the hardware, operating system, services and other applications, what is called the device's digital signature (see the study Fingerprint or Digital Device Fingerprint published by the AEPD). These personal data may be processed internally by the applications, although they may also be communicated internally to other applications within the same device or to external entities (e.g. a data analysis server).

Tabla de Contenidos

CONTENTS
I. Executive Summary.
II. Introduction.
-Objectives and Scope.
III. Privacy and Personal Data Protection in Android Applications:
-Android Application Environment.
-Privacy and Personal Data Protection in Android Applications.
-Declaration of privacy on Android applications.
IV. Data Flow Detection Techniques.
-Static analysis techniques for code.
-Identification of sources and exit points.
-Identification tools for sources and exit points.
-Static analysis of information flow.
-Tools for flow analysis.
-Dynamic analysis techniques.
-Event generation techniques.
-Traffic analysis techniques.
-Traffic interception techniques.
-Traffic decryption techniques.
-Information analysis techniques
-Tools.
V. Conclusions.
VI. References.


  • Formato: PDF
  • Número de páginas: 25
  • Tamaño: 496 Kb.

Agregar valoración

Para este apartado es necesario identificarse mediante la opción "Acceso" en el menú superior

Applications present on mobile phones can manage data such as photos, emails or calendar, can access certain data generated by integrated sensors in the device or connected to it, such as geo-localisation of the user's vital signs and certain identifiers used by the hardware, operating system, services and other applications, what is called the device's digital signature (see the study Fingerprint or Digital Device Fingerprint published by the AEPD). These personal data may be processed internally by the applications, although they may also be communicated internally to other applications within the same device or to external entities (e.g. a data analysis server).

Tabla de Contenidos

CONTENTS
I. Executive Summary.
II. Introduction.
-Objectives and Scope.
III. Privacy and Personal Data Protection in Android Applications:
-Android Application Environment.
-Privacy and Personal Data Protection in Android Applications.
-Declaration of privacy on Android applications.
IV. Data Flow Detection Techniques.
-Static analysis techniques for code.
-Identification of sources and exit points.
-Identification tools for sources and exit points.
-Static analysis of information flow.
-Tools for flow analysis.
-Dynamic analysis techniques.
-Event generation techniques.
-Traffic analysis techniques.
-Traffic interception techniques.
-Traffic decryption techniques.
-Information analysis techniques
-Tools.
V. Conclusions.
VI. References.


  • Formato: PDF
  • Número de páginas: 25
  • Tamaño: 496 Kb.
  • Lectura offline protegida
  • Lectura online

Agregar valoración

Para este apartado es necesario identificarse mediante la opción "Acceso" en el menú superior