Fig. 11From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareClass encryption procedure of DexProtectorBack to article page