Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Virtual Wall: Filtering Rootkit Attacks To Protect Linux Kernel Functions
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH44T3rwNzh_kYMHD3ZL03ZNRAQZFtGLynR4Kkn6wobiZHbgn2-StsOhgrdCE2jzkvfyJd_7HsBxr2CK8SINYhOqIEbDAotVTIA9VJwrFQuvxDTkN8_s_oFn_SU4nefCIKInn2HHPfq7_GKiZ-6orCuctjtLWtBKBa1yteZet9fQOUK7gKOY1jI-IRXdQd_iQGbhqcsqZdFCBPIlVX74YR9csnUYNp_lmdWdillSnTEsUK4b7cb__sEGrNX7TXJZTZBNWMK3LVhvajmQemlvweo3YcJtuHsaT11iCXHn7GckG7s7dfuGnI8uHiaT8mVcnndHF-SyLF2OPhlMyF0l-EAsuJ19klucvuEryWzU9BN7Bx6zq0H_OqhrLwTaQrAyUHFEqWFxkhrNeWS05CmmGGtmRzqhFItEausetBDWZ0hhYYykhdGoUmO3PDLaBYJFSqUSDKUUFqYKVSSF5KGNhhRNyGUbOo0hcl0rkrvCGK-5RyZU5IN-7iyX15Zrw8m8w3slxvF30203-vNm9cC34aCxdF4v1o_cFfILndNP9n7vtQ8rzFFZPIfvAJbL6QwPq-oRR34WfgGvdtsF
Ieee Transactions On Computers, Volume 70, Issue 10, pp. 1640 - 1653
Journal Article : Full Text Online
-
Rootkit inside GPU Kernel Execution
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwEA9DfNAHP6bgdEoffBKyNmm7pjAGsg-H7kGHQwShJO11H8oms4J_vpc2ndu7L22g1yb8Lpe7H-nlCLluJlxxkQTUS5miHqScIldJKTRBCaGUF-YnMb2I-1f-NBL9ToW8lbkw-rfKOcZFE9C3xmTZmH_aBkQ708s3Am_30C02ujZjphWhG8PocSiQXNhRKU514pINC1ygdeW5fLL311sMghflDTA-ouizuMmr80Ww7qex8dktv7VbDHF7_ebGKfWPyIGJJq3bYijHpAKLKjksKzVYxnCrZH_j2METctOatkfLZfY-y1r2tG3N8pqd1t3j2HqA1QI-rN4PxPmMPCXjfu-5M6CmZgKNfRZkFKMD35UycJE4iVCACHic8FB4SjkumpsfpzKVKvABXMZl7DEVg_Q95jgAQRK6Z8SCJHCkCjlIGSK9DFXiJ1Iw9GIOpEzIGqElFNFncSZGpLkEQheV0G1qpEaGBV5raaOhP2mtxqiLdKRsbby-ltbqRGOukXqJemQM7ivCMBVDNeRu4fn_9nZB9vTTIv2wTnay1TdcFpUjrvIJlV8Hv2Eg3DY
Ieice Transactions On Information And Systems, Volume E102.D, Issue 11, pp. 2261 - 2264
Journal Article : Full Text Online
-
Kernel rootkit prevention model using multiclass
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA5OL16cv8DplB68Zmuadk1gTHQ41IHMoYheStIkbirbnFPwv_clTZlePHlpD6WlfUnfe1_el_chdNxSkYyYSnFsiMSxNhEGrGKwbmnJmJQxd52Y7tnVQ3QzZL3uCrou98JYWmXpE52jVtPcrpE3KQR2CE8AEE5mb9iqRtnqaimhIby0gq3QJJxV0Bq4ZA4zfu3s_HowXK662PZlceyJXhDKSXP8DLi28UloYwwYc0Z5YjHV7zD1w0tTH3p6VfRVvrTjXTcK3kmxAvGLkF12dvy_79tEGz5fDU6LCbaFVvRkG1VLLYjAu4YdlPb1fKJfg_aoA7n44mW8aDdHnWDmO0RNJ4HT3Aksz_4pcDTG3Cbuu-iud37bvcBelAHn4FQX2DbYV4LkkhkJuRsxuZKRFqnJeUqV5mGuE5IbV84VkQhjI2OSshZVUtJUSbqHAq3SUEgOtwkOtuZSJUowAmEy1IYwUUNhafxsVjTdyBxYgfHK3HgBtqfZOMrceGXwjBqql2bN_F_4ni1tuv_35QO0HkGyUtBw62h1Mf_Qh4U8xJGfQnC-6F72Ho9QpZ9iOA6Sx2_kJ914
International Journal Of Reconfigurable And Embedded Systems, Volume 13, Issue 2, p. 395
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Rootkits : subverting the Windows kernel
https://find.library.duke.edu/catalog/DUKE99119328046408501
Book : View Online
-
Managed code rootkits : hooking into runtime environments
https://find.library.duke.edu/catalog/DUKE99119296841008501
Book : View Online
-
Rootkits and bootkits : reversing modern malware and next generation threats
https://find.library.duke.edu/catalog/DUKE99119357704408501
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info