“…Learning-based anomaly detection techniques [37,35,9,15,29,21,20,2] have been pursued for many years due to their ability to detect a broad range of attacks, including novel attacks. More recently, taint-tracking techniques (also known as information-flow techniques) [30,23,5,26,24,38] have become popular due to their high accuracy and the ability to detect a broad range of attacks.…”