Article Figure 1 Figure 2 Figure 3 Listing 1
Listing 2 Listing 3 Sidebar 1 Sidebar 2 sep2003.tar

Figure 2 How a kernel rootkit subverts the normal system calls