Implementing rootkits to address operating system vulnerabilities | IEEE Conference Publication | IEEE Xplore