Stealthy Profiling and Debugging of Malware Trampolining from User to Kernel Space | IEEE Conference Publication | IEEE Xplore