Fig. 1From: Structural analysis of packing schemes for extracting hidden codes in mobile malwarePacking and unpacking mechanismsBack to article page