Hund, Ralf2010-01-152010-01-152010-01-15http://hdl.handle.net/2003/2660310.17877/DE290R-15646en004Return-Oriented RootkitsBypassing Kernel Code Integrity Protection Mechanismsconference contribution