Fig. 6From: Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detectionTaint storage architecture of TaintChaserBack to article page