A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table | IEEE Conference Publication | IEEE Xplore