A methodology to detect and characterize Kernel level rootkit exploits involving redirection of the system call table | IEEE Conference Publication | IEEE Xplore