Fig. 14From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareLog output when running the repackaged appBack to article page