Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Malware Dynamic Analysis Evasion Techniques
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bb9MwFLYKvPDCXWJjID9A36Ilzs1B1VDIWiFYh2CZgKfIjm0a0U1oaYf2t_iFHMd20ooJgXiJ2lysxP7O8efjc0HoOU8JVVkUecqXzNMJyT3GIu7BXMSFipgfUx07_Im-_UI-fKSzYjT66WJhOl9mvT5vrahcE-Wg41W1f-OVqzD1qrEb69q-5AeHp--mFax9y_EljOzGfxh0J4HjF-Hsf_EC5wAxOv72HzDTNwon4DcgB46AHTj-FXrmbPlD-4QdmoL1Q-4SYN7avmZM8jr3a2ti20_WF5fbW8R5Me8c1tedY3XbXe8JfM7OG2N6zc-a3j_4uPnWSsVWxlS9PBuQe8KE_LporswzrxlnQ4QRA63Xmip_g4e-NWTAqtUmUHTQG-DYeVgW_RvOO7dSFyLugr18D_STeVxa3R2nXhqaPFpOucdkA8Sbmjq4fv6IdKqNMATeam0sWxm6j99Xs9Ojo6qcfi5voFtE0ytNx4t5P_sDI7L74-YFTaC2bnjfNrvNgLYJQMdqynvojl2O4Nwg4D4ayfMH6K4r9YGt5n-IJpPFgcXEZH9xgC0usMMFtrjAAy5e4hwbVDxC5WxaFm88W3jDq0mWrEBaE0o5TdOMy4CQlBOfCSC2MGoyApFX8BkqpUJlRAkVS0ESDpofBF2QmtbhY4TDWEYsSeogSHjEs4gLQesapB-W-4FgYgeNXSdUtc1Gr4uiLCsTKR9Xtrd2EO5v_G4SsPx-y57rxcrKUFsRvWMO_DSku3--_ATdHtC4h26uLtbyqSkN8qwb2l88aYMj
Acm Computing Surveys, Volume 52, Issue 6, pp. 1 - 28
Journal Article : Full Text Online
-
Why an Android App Is Classified as Malware
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LbxMxELYCvXABWpAoj8qHkktkdR_ezVqqiqq0gYJyaElVcYrG9q6yUtWibgMqf4s_yMzam92ESoC4rBLLjrTx53l5Zj7GdvUwygolpSiCHAQ1JBcAUgvURdoWEoIko9rhi-zjl-j0LBuPer2fTS1MnctM_nnlj8o9VQ5Ur0r5jXcNw9S70l-sU3wpCI_OPx3P0Ped9r_hzna-46Y3J7D_Nh7_L15wDBFD9bf_gJnlj-IAfkbk4BOxg8-_Qs_FnPoy1emO16UlW3VwUjkGzbIgqxWqwQQuv8PNSirR4WhCpBMNA3l9FVGhoKd5g7xtfVhfWTjy6tWw_qLG2_WPednmHTjB-LmtWXsPLr67KO8Wy8GxL6IoqS7Zq2MfzYg66VxeAKPHIuK4ptFB_eSFcjIUw1itSG1_m1N2nGcngsOOLnfBlN-1hKSGGtT7MFD39OFe04_LrEVXw53M_MIHbCMi-4rs8dGkvboKHJNy8yKuUpsW7vmFHRPIJd3Wtsz0KXvsnRB-6PZ9k_Xyqy32pCH44F7eP2MRwoDDFfcw4AgDflLxFgYcKr4_P_BI2N-bHzxn5-Pj6eiD8CQbwqAovxVpElmFXrTJ4zRXJlKyMEOrU1tAhraxsRJMEaeWaBaspfgXZApyquDWGlQSv2A8TnIJaWrCMNVSK6mtzYzBo46-fWjBbrN-88Iz41vPEwPK5WztL91mfDnxq-u2sj7l5Z-nvGKPWmi9Zg9vbxb5G0f2sVPv1S_Zz2_9
Acm Transactions On Software Engineering And Methodology, Volume 30, Issue 2, pp. 1 - 29
Journal Article : Full Text Online
-
Coevolution of Mobile Malware and Anti-Malware
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3dS8MwEA-bT_rgdBOcX-TBJzFb26RtAmMwhkWFPaiT4VPJJxPGKmPTf9-kTYcDEd9KSCDcXXN3ye_uB8C1SCNqGCHIBJoj15AccU4Esr5IKEN4EFNXOzyjj2_R0zPNxg1wu62F0VqX4DPdc5_lW74q5MZdlfUpxo5qqQmaKQuqWq361LVevSp7i-ME2SQD-xfMMGD96UP24kBctGfzC2ujwY4PqklVsPcpWQvM6t2UgOpeBSiprhZ2kNZ1y8b_bvwIHPowE44quzgGDb1sg1ZN4QD9H90GBz_6EXbAYFzoT2-LsDBwUgh7aMDBfDjhiy--0oP-fAj5UsHRcv2OdsdPwGt2Nx3fI0-vgCTG4RpZn5VyYlyPRo1JbFOb0GiFGUkUTiMZyEiwSBqBbRQQM63T1GiOOUtsiCa1ofgUQBxrwpNEhmEiiGBEKEWltEq2WV2ouOqCoJZ0Ln3Tccd9scjL5CNguVNO7pSTe-V0wc12yUfVceOvyR0n7e1EL-iz34fPwb5bXGHxLsDeerXRlxULxFVpTd-tzcdz
Ieee Transactions On Information Forensics And Security, Volume 13, Issue 10, pp. 2563 - 2574
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
-
Malware : fighting malicious code
https://find.library.duke.edu/catalog/DUKE99119304570508501
Book : View Online
-
Our WebsiteSee all website results »
Guides, policies, news more
-
Ad-Blocking ... and a Mea Culpa - Bitstreams: The Digital Collections Blog
https://blogs.library.duke.edu/bitstreams/2019/02/12/ad-blocking-and-a-mea-culpa/
More recently, ads have even been implicated in malware attacks. So it’s no surprise that ad-blocking technology is now mainstream.
-
Sad but true hacks - Duke University Libraries Blogs
https://blogs.library.duke.edu/blog/2011/03/15/sad-but-true-hacks/
Currently the disaster in Japan is being searched a lot and some of the links returned will install malware if you click on them. The (...)
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info