Fig. 2From: Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detectionDominate tree of example codeBack to article page