Fig. 8From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareModified unpacking procedure for extracting the original classes.dex Back to article page