Fig. 3From: Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detectionThe basic principle of dynamic taint tracking technologyBack to article page