Research Article

All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis

Table 4

Detection techniques used in existing and proposed approaches.

MethodDP-NEPDP-SIGDP-WRDP-ENT

PEiD [23]
[17]
[16]
Proposed approach