Fig. 5From: Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detectionTaint marked process of TaintChaser IIBack to article page