Fig. 7From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareTarget app process is terminated when being attached to IDABack to article page