Fig. 4From: DroidEcho: an in-depth dissection of malicious behaviors in Android applicationsTaint analysis across multiple domainsBack to article page