Fig. 9From: Structural analysis of packing schemes for extracting hidden codes in mobile malwareModified code to extract the original classes.dex Back to article page