Mojtaba Eskandari, Bruno Kessler, Maqsood Ahmad, Anderson Santana de Oliveira and Bruno Crispo
/ACM 1st International Workshop on, pages 2-7, May 2015.
 Shauvik Roy Choudhary, Alessandra Gorla, and Alessandro Orso. Automated Test Input Generation for Android: Are We There Yet?(E). In Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, pages 429-440. IEEE, 2015.
 Fred Chung. Custom Class Loading in Dalvik. http: //android-developers.blogspot.it/2011/07/custom-classloading- in-dalvik.html.
 Court of Justice of the EuropeanUnion. The court of justice declares that the
Martino Trevisan, Stefano Traverso, Eleonora Bassi and Marco Mellia
. https://www.webpagetest.org/ .
 Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A Digital Single Market Strategy for Europe, COM(2015) 192 final), 2015.
 A car , G., E ubank , C., E nglehardt , S., J uarez , M., N arayanan , A., and D iaz , C. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2014), CCS ’14, ACM, pp
://www.cint.com/about [Accessed: 06- Apr- 2015].
 M. Cogley. Of course Facebook would go to a country with the lowest levels of data protection, 2015. http://www.newstalk.com/Of-course-Facebook-would-go-to-a-countrywith- the-lowest-levels-of-data-protection- [Accessed: 20- Jul- 2015].
 Administration discussion draft: Consumer Privacy Bill of Rights Act of 2015, 2015. https://www.whitehouse.gov/sites/default/files/omb/legislative/letters/cpbr-act-of-2015-discussion-draft.pdf [Accessed: 15- Jun- 2015].
 Council of the EuropeanUnion
Rogaway. Entity authentication and key distribution. In CRYPTO , pages 232–249, 1993.
 Benjamin Berdouche, Kartikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre Yves Strub, and Jean Karim Zinzindohoue. A messy state of the union: Taming the composite state machines of TLS. In Proceedings of IEEE S&P 2015 , pages 535–552. IEEE, 2015.
 Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, and Jean Karim Zinzindohoue
Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic
Processing of Personal Data and on the Free Movement of Such Data, 1995.
 European Parliament. Regulation 2016/679 of the European Parliament and the Council of the EuropeanUnion of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), 2016.
 Federal Aviation Administration. Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI), 2011
free movement of such data, and repealing Directive 95/46/EC (GDPR). Official Journal of the EuropeanUnion , L119, May 2016.
 Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. High-throughput semi-honest secure three-party computation with an honest majority. In ACM CCS , 2016.
 Donald Beaver. Efficient multiparty protocols using circuit randomization. In Annual International Cryptology Conference , pages 420–432. Springer, 1991.
 Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for
Niklas Buescher, Spyros Boukoros, Stefan Bauregger and Stefan Katzenbeisser
 European Parliament and Council of the EuropeanUnion, “Directive 2006/32/ec of the european parliament and of the council,” 2006.
 G. W. Hart, “Nonintrusive appliance load monitoring,” Proceedings of the IEEE , vol. 80, no. 12, pp. 1870–1891, 1992.
 H. Lam, G. Fung, and W. Lee, “A novel method to construct taxonomy electrical appliances based on load signatures of,” IEEE Transactions on Consumer Electronics , vol. 53, no. 2, pp. 653–660, 2007.
 U. Greveler, B. Justus, and D. Loehr, “Forensic content detection
David M. Sommer, Sebastian Meiser and Esfandiar Mohammadi
, 2017, pp. 103 – 138.
 EU Regulation, “European data protection regulation (GDPR),” Off J Eur Union , vol. L119, pp. 1–88, 4th May 2016.
 D. Sommer, A. Dhar, L. Malitsa, E. Mohammadi, D. Ronzani, and S. Capkun, “Anonymous Communication for Messengers via “Forced” Participation,” Technical report, available under https://eprint.iacr.org/2017/191 , 2017.
 S. Vadhan, G. N. Rothblum, and C. Dwork, “Boosting and differential privacy,” in 2010 IEEE 51st Annual Symposium on Foundations of Computer Science (FOCS) , 2010, pp. 51–60.
Konstantinos Chatzikokolakis, Catuscia Palamidessi and Marco Stronati
1 This work was partially supported by the EuropeanUnion 7th FP project MEALS, by the project ANR-12-IS02-001 PACE, and by the INRIA Large Scale Initiative CAPPRIS.
 https://github.com/paracetamolo/elastic-mechanism .
 M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: differential privacy for location-based systems. In Proc. of CCS , pages 901–914. ACM, 2013.
 C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Location privacy protection
, Heidelberg, Mar. 2006.
 E. Fenske, A. Mani, A. Johnson, and M. Sherr. Distributed measurement with private set-union cardinality. In B. M. Thuraisingham, D. Evans, T. Malkin, and D. Xu, editors, ACM CCS 17 , pages 2295–2312. ACM Press, Oct. / Nov. 2017.
 M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In C. Cachin and J. Camenisch, editors, EUROCRYPT 2004 , volume 3027 of LNCS , pages 1–19. Springer, Heidelberg, May 2004.
 O. Goldreich. Towards a theory of software protection and simulation by