Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3560564acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps

Published: 07 November 2022 Publication History

Abstract

Adopted in May 2018, the European Union's General Data Protection Regulation (GDPR) requires the consent for processing users' personal data to be freely given, specific, informed, and unambiguous. While prior work has shown that this often is not given through automated network traffic analysis, no research has systematically studied how consent notices are currently implemented and whether they conform to GDPR in mobile apps.
To close this research gap, we perform the first large-scale study into consent notices for third-party tracking in Android apps to understand the current practices and the current state of GDPR's consent violations. Specifically, we propose a mostly automated and scalable approach to identify the currently implemented consent notices and apply it to a set of 239,381 Android apps. As a result, we recognize four widely implemented mechanisms to interact with the consent user interfaces from 13,082 apps. We then develop a tool that automatically detects users' personal data sent out to the Internet with different consent conditions based on the identified mechanisms. Doing so, we find 30,160 apps do not even attempt to implement consent notices for sharing users' personal data with third-party data controllers, which mandate explicit consent under GDPR. In contrast, out of 13,082 apps implemented consent notices, we identify 2,688 (20.54%) apps violate at least one of the GDPR consent requirements, such as trying to deceive users into accepting all data sharing or even continuously transmitting data when users have explicitly opted out. To allow developers to address the problems, we send emails to notify affected developers and gather insights from their responses. Our study shows the urgent need for more transparent processing of personal data and supporting developers in this endeavor to comply with legislation, ensuring users can make free and informed choices regarding their data.

References

[1]
Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. 2016. AndroZoo: Collecting Millions of Android Apps for the Research Community. In MSR.
[2]
Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with POLICHECK. In USENIX Security.
[3]
Apple. 2022. User Privacy and Data Use. https://developer.apple.com/app-store/user-privacy-and-data-use/. 2022/04/29.
[4]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Notices.
[5]
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. 2012. Pscout: analyzing the android permission specification. In CCS.
[6]
Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, and David Wetherall. 2014. Brahmastra: Driving apps to test the security of third-party components. In USENIX Security.
[7]
Benjamin Bichsel, Veselin Raychev, Petar Tsankov, and Martin Vechev. 2016. Statistical deobfuscation of android applications. In CCS.
[8]
European Data Protection Board. 2019. Guidelines 2/2019 on the processing of personal data under Article 6(1)(b) GDPR in the context of the provision of online services to data subjects". https://edpb.europa.eu/sites/edpb/files/files/file1/edpb_guidelines-art_6-1-b-adopted_after_public_consultation_en.pdf. 2019/02.
[9]
Dino Bollinger, Karel Kubicek, Carlos Cotrini, and David Basin. 2022. Automating Cookie Consent and GDPR Violation Detection. In USENIX Security.
[10]
Richard Bonett, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, and Denys Poshyvanyk. 2018. Discovering flaws in security-focused static analysis tools for android using systematic mutation. In USENIX Security.
[11]
CCPA. 2022. California Consumer Privacy Act (CCPA). https://oag.ca.gov/privacy/ccpa. 2022/04/29.
[12]
Aldo Cortesi, Maximilian Hils, Thomas Kriechbaumer, and contributors. 2010--. mitmproxy: A free and open source interactive HTTPS proxy. https://mitmproxy.org/ [Version 6.0].
[13]
Datatilsynet. 2022. Intention to issue ? 10 million fine to Grindr LLC. https://www.datatilsynet.no/en/news/2021/intention-to-issue--10-million-fine-to-grindr-llc2/2022/04/29.
[14]
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2019. We value your privacy... now take some cookies: Measuring the GDPR's impact on web privacy. In NDSS.
[15]
Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide scanning and its security applications. In USENIX Security.
[16]
europa.eu. 2022/04/29. ?Opinion 06/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95/46/EC (Article 29 Working Party). https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2014/wp217_en.pdf.
[17]
Facebook. 2022. FB SDK Best Practices for GDPR Compliance. https://developers.facebook.com/docs/app-events/gdpr-compliance/. 2022/04/28.
[18]
Filyp. 2022. autocorrect. https://github.com/filyp/autocorrect2022/04/28.
[19]
Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. 2017. Stack overflow considered harmful? the impact of copy&paste on android application security. In SP.
[20]
NOYB -- European Center for Digital Rights. 2022. NCC & noyb GDPR complaint: Grindr fined ? 6.3 Mio over illegal data sharing. https://noyb.eu/en/ncc-noyb-gdpr-complaint-grindr-fined-eu-63-mio-over-illegal-data-sharing 2022/04/28.
[21]
forbrukerradet.no. 2022/04/29. OUT OF CONTROL. https://fil.forbrukerradet.no/wp-content/uploads/2020/01/2020-01-14-out-of-control-final-version.pdf.
[22]
GDPR. 2013. Opinion 03/2013 on purpose limitation (WP 203), adopted on 2 April 2013. https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf 2022/04/21.
[23]
GDPR. 2021a. Art. 4 Definitions. https://gdpr.eu/article-4-definitions/2021/02/01.
[24]
GDPR. 2021b. Art. 6 Lawfulness of processing. https://gdpr.eu/article-6-how-to-process-personal-data-legally/ 2021/02/01.
[25]
GDPR. 2021c. Art. 7 Conditions for consent. https://gdpr.eu/article-7-how-to-get-consent-to-collect-personal-data/2021/02/01.
[26]
Google. 2021/02/02. Advertising ID. https://support.google.com/googleplay/android-developer/answer/6048248?hl=en.
[27]
Google. 2022a. Advertising ID. https://support.google.com/googleplay/android-developer/answer/6048248?hl=en 2022/04/28.
[28]
Google. 2022b. Android Permission. https://developer.android.com/reference/android/Manifest.permission 2022/04/28.
[29]
Google. 2022c. Obtaining Consent with the User Messaging Platform. https://developers.google.com/admob/ump/android/quick-start2022/04/24.
[30]
IAB Europe GDPR Implementation Group. 2017. The definition of Personal Data - Working Paper 02/2017. https://iabeurope.eu/wp-content/uploads/2019/08/20170719-IABEU-GIG-Working-Paper02_Personal-Data.pdf.
[31]
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall. 2011. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In CCS.
[32]
Andreas Hotho, Steffen Staab, and Gerd Stumme. 2003. Ontologies improve text document clustering. In ICDM.
[33]
ICCL. 2022/03/08. Landmark litigation. https://www.iccl.ie/rtb-june-2021/.
[34]
Georgios Kampanos, Siamak F Shahandashti, and Name Name. 2021. Accept All: The Landscape of Cookie Banners in Greece and the UK. In IFIP SEC.
[35]
Simon Koch, Malte Wessels, Benjamin Altpeter, Madita Olvermann, and Martin Johns. 2022. Keeping Privacy Labels Honest. PoPETs (2022).
[36]
Konrad Kollnig, Pierre Dewitte, Max Van Kleek, Ge Wang, Daniel Omeiza, Helena Webb, and Nigel Shadbolt. 2021. A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps. In SOUPS.
[37]
Ronald Leenes and Eleni Kosta. 2015. Taming the cookie monster with dutch law--a tale of regulatory failure. Computer Law & Security Review (2015).
[38]
Li Li, Tegawendé F Bissyandé, Mike Papadakis, Siegfried Rasthofer, Alexandre Bartel, Damien Octeau, Jacques Klein, and Le Traon. 2017a. Static analysis of android apps: A systematic literature review. Information and Software Technology (2017).
[39]
Yuanchun Li, Ziyue Yang, Yao Guo, and Xiangqun Chen. 2017b. Droidbot: a lightweight ui-guided test input generator for android. In ICSE-C.
[40]
Rachel Tsz-Wai Lo, Ben He, and Iadh Ounis. 2005. Automatically building a stopword list for an information retrieval system. In DIR.
[41]
Célestin Matte, Nataliia Bielova, and Cristiana Santos. 2020. Do Cookie Banners Respect my Choice?: Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. In SP.
[42]
GA Miller. 1995. WordNet: a lexical database for English. COMMUN ACM (1995).
[43]
Trung Tin Nguyen, Michael Backes, Ninja Marnau, and Ben Stock. 2021. Share First, Ask Later (or Never?) Studying Violations of {GDPR's} Explicit Consent in Android Apps. In USENIX Security.
[44]
Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, and Michael Backes. 2020. Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. In ASIA CCS.
[45]
NOYB -- European Center for Digital Rights. 2021. Google: If you don't want us to track your phone -- just get another tracking ID! https://noyb.eu/en/complaint-filed-against-google-tracking-id. 2021/01/17.
[46]
objection. 2021. Runtime Mobile Exploration. https://github.com/sensepost/objection. 2021/01/17.
[47]
Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, and Sascha Fahl. 2021. Why Eve and Mallory Still Love Android: Revisiting {TLS}({In) Security} in Android Applications. In USENIX Security.
[48]
Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, Rui Shao, and Yan Chen. 2018. Flowcog: context-aware semantics extraction and analysis of information flow leaks in android apps. In USENIX Security.
[49]
The European Parliament and the Council of the European Union. 2002. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). (2002).
[50]
Data Protection Working Party. 2010. Opinion 4/2010 on the European code of conduct of FEDMA for the use of personal data in direct marketing. https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/files/2010/wp174_en.pdf. 2022/04/28.
[51]
Data Protection Working Party. 2016. Guidelines on Consent under Regulation 2016/679 (wp259rev.01). https://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=623051. 2020/09/04.
[52]
Sai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Ulfar Erlingsson, Pauline Anthonysamy, and Giles Hogben. 2019. Reducing Permission Requests in Mobile Apps. In Proceedings of ACM Internet Measurement Conference (IMC).
[53]
publicsuffixlist. 2021. publicsuffixlist. https://github.com/ko-zu/psl. 2021/05.
[54]
Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, and Phillipa Gill. 2018. Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem. In NDSS.
[55]
General Data Protection Regulation. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46. OJEU (2016).
[56]
Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, and David Choffnes. 2016. Recon: Revealing and controlling pii leaks in mobile network traffic. In MobiSys.
[57]
Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez, and Serge Egelman. 2018. Won't somebody think of the children?" examining COPPA compliance at scale. PETS (2018).
[58]
Iskander Sanchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, and Igor Santos. 2019. Can i opt out yet? gdpr and the global illusion of cookie control. In Asia CCS.
[59]
Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D Breaux, and Jianwei Niu. 2016. Toward a framework for detecting privacy policy violations in android application code. In ICSE.
[60]
Bharath Sriram, Dave Fuhry, Engin Demir, Hakan Ferhatosmanoglu, and Murat Demirbas. 2010. Short text classification in twitter to improve information filtering. In ACM SIGIR.
[61]
Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, and Michael Backes. 2016. Hey, you have a problem: On the feasibility of large-scale web vulnerability notification. In USENIX Security.
[62]
Techcrunch. 2022a. France spanks Google $170M, Facebook $68M over cookie consent dark patterns. https://techcrunch.com/2022/01/06/cnil-facebook-google-cookie-consent-eprivacy-breaches/2022/04/28.
[63]
Techcrunch. 2022b. How a small French privacy ruling could remake adtech for good. https://techcrunch.com/2018/11/20/how-a-small-french-privacy-ruling-could-remake-adtech-for-good/ 2022/04/28.
[64]
Vasant Tendulkar and William Enck. 2014. An application package configuration approach to mitigating android ssl vulnerabilities. MoST (2014).
[65]
Tesseract. 2022/03/08. Tesseract-OCR. https://github.com/tesseract-ocr/tesseract.
[66]
Stefano Traverso, Martino Trevisan, Leonardo Giannantoni, Marco Mellia, and Hassan Metwalley. 2017. Benchmark and comparison of tracker-blockers: Should you trust them?. In TMA.
[67]
Martino Trevisan, Stefano Traverso, Eleonora Bassi, and Marco Mellia. 2019. 4 years of EU cookie law: Results and lessons learned. PETS (2019).
[68]
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un) informed Consent: Studying GDPR Consent Notices in the Field. In CCS.
[69]
Pelayo Vallina, Álvaro Feal, Julien Gamba, Narseo Vallina-Rodriguez, and Antonio Fernández Anta. 2019. Tales from the porn: A comprehensive privacy analysis of the web porn ecosystem. In IMC.
[70]
Yan Wang, Hailong Zhang, and Atanas Rountev. 2016. On the unsoundness of static analysis for Android GUIs. In PLDI.
[71]
Joe H Ward Jr. 1963. Hierarchical grouping to optimize an objective function. Journal of the American statistical association (1963).
[72]
Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori. 2015. Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps. In SOUPS.
[73]
Charles Weir, Ben Hermann, and Sascha Fahl. 2020. From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security. In USENIX Security.
[74]
Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android permissions remystified: A field study on contextual integrity. In USENIX Security.
[75]
Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, and Xiaobo Ma. 2020. Packergrind: An adaptive unpacking system for android apps. IEEE Trans. Softw. Eng (2020).
[76]
Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, and X Sean Wang. 2013. Appintent: Analyzing sensitive data transmission in android for privacy leakage detection. In CCS.
[77]
Le Yu, Xiapu Luo, Xule Liu, and Tao Zhang. 2016. Can we trust the privacy policies of android apps?. In DSN.
[78]
Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M Sadeh, Steven M Bellovin, and Joel R Reidenberg. 2017. Automated Analysis of Privacy Requirements for Mobile Apps. In NDSS.

Cited By

View all
  • (2024)Shadows in the Interface: A Comprehensive Study on Dark PatternsProceedings of the ACM on Software Engineering10.1145/36437361:FSE(204-225)Online publication date: 12-Jul-2024
  • (2024)Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential PrivacyProceedings of the ACM on Human-Computer Interaction10.1145/36373098:CSCW1(1-56)Online publication date: 26-Apr-2024
  • (2024)Measuring Compliance with the California Consumer Privacy Act Over Space and TimeProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642597(1-19)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
        November 2022
        3598 pages
        ISBN:9781450394505
        DOI:10.1145/3548606
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 07 November 2022

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. android security
        2. consent
        3. gdpr
        4. user privacy

        Qualifiers

        • Research-article

        Conference

        CCS '22
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

        Upcoming Conference

        CCS '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)389
        • Downloads (Last 6 weeks)33
        Reflects downloads up to 07 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Shadows in the Interface: A Comprehensive Study on Dark PatternsProceedings of the ACM on Software Engineering10.1145/36437361:FSE(204-225)Online publication date: 12-Jul-2024
        • (2024)Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential PrivacyProceedings of the ACM on Human-Computer Interaction10.1145/36373098:CSCW1(1-56)Online publication date: 26-Apr-2024
        • (2024)Measuring Compliance with the California Consumer Privacy Act Over Space and TimeProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642597(1-19)Online publication date: 11-May-2024
        • (2024)SoK: Technical Implementation and Human Impact of Internet Privacy Regulations2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00206(673-696)Online publication date: 19-May-2024
        • (2024)Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00014(735-751)Online publication date: 19-May-2024
        • (2024)How Many Hands in the Cookie Jar? Examining Privacy Implications of Popular Apps in India2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP60621.2024.00046(741-757)Online publication date: 8-Jul-2024
        • (2024)Conceptual Framework for Designing Hippocratic APIsConceptual Modeling10.1007/978-3-031-75872-0_19(355-376)Online publication date: 21-Oct-2024
        • (2023)The OK is not enoughProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620543(5467-5484)Online publication date: 9-Aug-2023
        • (2023)Shielding citizens? Understanding the impact of political advertisement transparency informationNew Media & Society10.1177/1461444823115764026:11(6715-6735)Online publication date: 20-Mar-2023
        • (2023)Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the ImplementationProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605064(1-10)Online publication date: 29-Aug-2023
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media