Fig. 4From: Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detectionTaint marked process of TaintChaser IBack to article page