9DITTRICHD.“Root Kits”and hiding files/directories/processes af-ter a break-in. http://staff.washington.edu/dittrich/misc/faqs/rootkits.faq . 2002
10LEVINE J G,,GRIZZARD J B,OWEN H W.A methodology to de-tect and characterize kernel level Rootkit exploits involving redirectionof the system call table[].Proc of the nd IEEE International In-formation Assurance Workshop.2004