Fig. 10From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareSmali code disassembled from the extracted classes.dex Back to article page