Fig. 3From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareSource code decompiled from Util classesBack to article page