Fig. 17From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareSmali code disassembled from the second new.apk fileBack to article page