Fig. 12From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareDexProtector class decryption procedureBack to article page