Mojtaba Eskandari, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira and Bruno Crispo
/ACM 1st International Workshop on, pages 2-7, May 2015.
 Shauvik Roy Choudhary, Alessandra Gorla, and Alessandro Orso. Automated Test Input Generation for Android: Are We There Yet?(E). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, pages 429-440. IEEE, 2015.
 Fred Chung. Custom Class Loading in Dalvik. http: //android-developers.blogspot.it/2011/07/custom-classloading- in-dalvik.html.
 Court of Justice of the EuropeanUnion. The court of justice declares that the
Martino Trevisan, Stefano Traverso, Eleonora Bassi and Marco Mellia
Personalized advertisement has changed the web. It lets websites monetize the content they offer. The downside is the continuous collection of personal information with significant threats to personal privacy. In 2002, the European Union (EU) introduced a first set of regulations on the use of online tracking technologies. It aimed, among other things, to make online tracking mechanisms explicit to increase privacy awareness among users.
Amended in 2009, the EU Directive mandates websites to ask for informed consent before using any kind of profiling technology, e.g., cookies. Since 2013, the ePrivacy Directive became mandatory, and each EU Member State transposed it in national legislation. Since then, most of European websites embed a “Cookie Bar”, the most visible effect of the regulation.
In this paper, we run a large-scale measurement campaign to check the current implementation status of the EU cookie directive. For this, we use CookieCheck, a simple tool to automatically verify legislation violations. Results depict a shady picture: 49 % of websites do not respect the Directive and install profiling cookies before any user’s consent is given.
Beside presenting a detailed picture, this paper casts lights on the difficulty of legislator attempts to regulate the troubled marriage between ad-supported web services and their users. In this picture, online privacy seems to be continuously at stake, and it is hard to reach transparency.
://www.cint.com/about [Accessed: 06- Apr- 2015].
 M. Cogley. Of course Facebook would go to a country with the lowest levels of data protection, 2015. http://www.newstalk.com/Of-course-Facebook-would-go-to-a-countrywith- the-lowest-levels-of-data-protection- [Accessed: 20- Jul- 2015].
 Administration discussion draft: Consumer Privacy Bill of Rights Act of 2015, 2015. https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/cpbr-act-of-2015-discussion-draft.pdf [Accessed: 15- Jun- 2015].
 Council of the EuropeanUnion
free movement of such data, and repealing Directive 95/46/EC (GDPR). Official Journal of the EuropeanUnion , L119, May 2016.
 Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. High-throughput semi-honest secure three-party computation with an honest majority. In ACM CCS , 2016.
 Donald Beaver. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference , pages 420–432. Springer, 1991.
 Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for
Konstantinos Chatzikokolakis, Catuscia Palamidessi and Marco Stronati
1 This work was partially supported by the EuropeanUnion 7th FP project MEALS, by the project ANR-12-IS02-001 PACE, and by the INRIA Large Scale Initiative CAPPRIS.
 https://github.com/paracetamolo/elastic-mechanism .
 M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: differential privacy for location-based systems. In Proc. of CCS , pages 901–914. ACM, 2013.
 C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Location privacy protection
Niklas Buescher, Spyros Boukoros, Stefan Bauregger and Stefan Katzenbeisser
 European Parliament and Council of the EuropeanUnion, “Directive 2006/32/ec of the european parliament and of the council,” 2006.
 G. W. Hart, “Nonintrusive appliance load monitoring,” Proceedings of the IEEE , vol. 80, no. 12, pp. 1870–1891, 1992.
 H. Lam, G. Fung, and W. Lee, “A novel method to construct taxonomy electrical appliances based on load signatures of,” IEEE Transactions on Consumer Electronics , vol. 53, no. 2, pp. 653–660, 2007.
 U. Greveler, B. Justus, and D. Loehr, “Forensic content detection
Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic
Processing of Personal Data and on the Free Movement of Such Data, 1995.
 European Parliament. Regulation 2016/679 of the European Parliament and the Council of the EuropeanUnion of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), 2016.
 Federal Aviation Administration. Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI), 2011
Alexandros Mittos, Bradley Malin and Emiliano De Cristofaro
. Ioannidis. Meta-Analysis Methods for Genome-Wide Association Studies and Beyond. Nature Reviews Genetics , 14(6):379–389, 2013.
[EN14] Y. Erlich and A. Narayanan. Routes for Breaching and Protecting Genetic Privacy. Nature Reviews Genetics , 15(6):409–421, 2014.
[Eur16] European Parliament and Council of EuropeanUnion. General Data Protection Regulation. Official Journal of the EuropeanUnion , L119:1–88, May 2016.
[FLJ + 14] M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart. Privacy in Pharmacogenetics: An Endto-End Case Study of
 D. P. D. Farias and N. Megiddo, “Combining expert advice in reactive environments,” J. ACM, vol. 53, no. 5, pp. 762-799, Sep. 2006. [Online]. Available: http://doi.acm.org/10.1145/1183907.1183911
 Apple Support, “iOS: Understanding iBeacon,” https://support.apple.com/en-gb/HT202880, Feb. 2015.
 R. Rodrigues, D. Barnard-Wills, D. Wright, P. De Hert, V. Papakonstantinou, L. Beslay, E. JRC-IPSC, N. Dubois, and E. JUST, “EU privacy seals project,” Publications Office of the EuropeanUnion, 2013.
 P. Higgins