![Table 1 from On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices | Semantic Scholar Table 1 from On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/17b3a4a1216c28961471e725eaa01735ab93486d/3-Figure1-1.png)
Table 1 from On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices | Semantic Scholar
![A deep learning based static taint analysis approach for IoT software vulnerability location - ScienceDirect A deep learning based static taint analysis approach for IoT software vulnerability location - ScienceDirect](https://ars.els-cdn.com/content/image/1-s2.0-S026322411931005X-ga1.jpg)
A deep learning based static taint analysis approach for IoT software vulnerability location - ScienceDirect
![Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications | SpringerLink Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications | SpringerLink](https://media.springernature.com/original/springer-static/image/chp%3A10.1007%2F978-3-030-21548-4_27/MediaObjects/482330_1_En_27_Fig2_HTML.png)
Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications | SpringerLink
![FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps | Secure Software Engineering FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps | Secure Software Engineering](http://blogs.uni-paderborn.de/sse/files/2013/05/android-ss-1.png)