Attackers and defenders of computer systems both
strive to gain complete control over the system. To
maximize their control, both attackers and defenders
have migrated to low-level, operating system code. In
this paper, we assume the perspective of the attacker,
who is trying to run malicious software and avoid detection.
By assuming this perspective, we hope to help
defenders understand and defend against the threat
posed by a new class of rootkits