Fig. 18From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareProcess used to obtain the original class from the APK file with class encryptionBack to article page