5 CONCLUSIONS
This paper has described a new method that combines
information from different sources to identify
organizations receiving personal data. The method
achieves a 94.73% precision and has been applied to
identify the corporations receiving personal data from
1,000 Android apps. We are working on applying
these results at scale to have a clearer picture of the
personal data collectors in the mobile ecosystem.
ACKNOWLEDGEMENTS
This work was partially supported by the Comunidad
de Madrid and Universidad Politécnica de Madrid
through the V-PRICIT Research Programme Apoyo
a la realización de Proyectos de I+D para jóvenes
investigadores UPM-CAM, under Grant APOYO-
JOVENES-QINIM8-72-PKGQ0J. The identification
of the relationships between companies was possible
thanks to Crunchbase, who kindly allowed us free
access to its API for this research.
REFERENCES
Cozar, M., Rodriguez, D., Del Alamo, J., Guaman, D.
(2022). Reliability of IP Geolocation Services for
Assessing the Compliance of International Data
Transfers. In 2022 IEEE European Symposium on
Security and Privacy Workshops (EuroS&PW).
SSL Survey | Netcraft. Retrieved April 5, 2022, from
https://www.netcraft.com/internet-data-mining/ssl-
survey/.
“Technical Overview | ICANN WHOIS.” ICANN
LOOKUP, Internet Corporation for Assigned Names
and Numbers, whois.icann.org/en/technical-overview.
Accessed 27 May 2022.
“Current Issues | ICANN WHOIS.” ICANN | LOOKUP,
Internet Corporation for Assigned Names and
Numbers, whois.icann.org/en/current-issues. Accessed
27 May 2022.
“UI/Application Exerciser Monkey.” Android Developers.
Retrieved May 27, 2022, from https://developer.an
droid.com/studio/test/other-testing-tools/monkey.
Guaman, D. S., Del Alamo, J. M., & Caiza, J. C. (2021).
GDPR Compliance Assessment for Cross-Border
Personal Data Transfers in Android Apps. IEEE Access,
9, 15961-15982.
Libert, T., Desai, A., & Patel, D. (2021). Preserving
Needles in the Haystack: A search engine and multi-
jurisdictional forensic documentation system for
privacy violations on the web.
Ziv, M., Izhikevich, L., Ruth, K., Izhikevich, K., &
Durumeric, Z. (2021). ASdb: a system for classifying
owners of autonomous systems. In Proceedings of the
21st ACM Internet Measurement Conference (pp. 703-
719).
Guaman, D. S., Del Alamo, J. M., & Caiza, J. C. (2020). A
systematic mapping study on software quality control
techniques for assessing privacy in information
systems. IEEE access, 8, 74808-74833.
Torre, D., Abualhaija, S., Sabetzadeh, M., Briand, L.,
Baetens, K., Goes, P., & Forastier, S. (2020). An ai-
assisted approach for checking the completeness of
privacy policies against gdpr. In 2020 IEEE 28th
International Requirements Engineering Conference
(RE) (pp. 136-146).
N. Wongwiwatchai, P. Pongkham, and K. Sripanidkulchai,
(2020). “Detecting personally identifiable information
transmission in android applications using light-weight
static analysis,” Comput. Secur., vol. 99, 2020, doi:
10.1016/j.cose.2020.102011.
Gamba, J., Rashed, M., Razaghpanah, A., Tapiador, J., &
Vallina-Rodriguez, N. (2020, May). An analysis of pre-
installed android software. In 2020 IEEE Symposium on
Security and Privacy (SP) (pp. 1039-1055).
Hosseini, M. B., Pragyan, K. C., Reyes, I., & Egelman, S.
(2020, November). Identifying and classifying third-
party entities in natural language privacy policies. In
Proceedings of the Second Workshop on Privacy in
NLP (pp. 18-27).
Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K. G.,
& Aberer, K. (2018). Polisis: Automated analysis and
presentation of privacy policies using deep learning. In
27th USENIX Security Symposium (USENIX Security
18) (pp. 531-548).
Razaghpanah, A., Nithyanand, R., Vallina-Rodriguez, N.,
Sundaresan, S., Allman, M., Kreibich, C., & Gill, P.
(2018, February). Apps, trackers, privacy, and
regulators: A global study of the mobile tracking
ecosystem. In The 25th Annual Network and
Distributed System Security Symposium (NDSS 2018).
“Regulation (EU) 2016/679 of the European Parliament and
of the Council of 27 April 2016 on the Protection of
Natural Persons with Regard to the Processing of
Personal Data and on the Free Movement of Such Data,
and Repealing Directive 95/46/EC (General Data
Protection Regulation).” EUR-Lex, Publications Office,
27 Apr. 2016, eur-lex.europa.eu/eli/reg/2016/679/oj.
Balebako, R., Marsh, A., Lin, J., Hong, J. I., & Cranor, L.
F. (2014). The privacy and security behaviors of
smartphone app developers. In The 21st Annual
Network and Distributed System Security Symposium
(NDSS 2014).
Balebako, R., Jung, J., Lu, W., Cranor, L. F., & Nguyen, C.
(2013, July). " Little brothers watching you" raising
awareness of data leaks on smartphones. In
Proceedings of the Ninth Symposium on Usable Privacy
and Security (pp. 1-11).