Fig. 15From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareJava code decompiled from the first new.apk fileBack to article page