“…The analysis tracks all the variables on which the lock is acquired and checks if the locks on these variables are released on every program path. If not, it reports that the problem exists.Taint [28]. Taint analysis detects and reports possible vulnerabilities by performing a taint analysis.…”