“…The achieved results show that it is possible to successfully fingerprint an Android app (or type of app) [16], [28], [29], [5], [43], [6], [47], [56], [61], as well as an action performed by a mobile user on her Android device [30], [39], [45], [46], [52]. In [29], [5], [41], [50], [54], [57], [58], it is reported that Android apps extensively leak the PII of mobile users, and the works in [23], [27] highlight that an important role in this phenomenon is played by the embedded ad libraries. Regarding mobile advertisement, Crussell et al in [33] prove that many Android apps trick the advertisement business model in order to let their developers illicitly earn money.…”