1. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., and Zhou, Y. Understanding the Mirai botnet. In USENIX Security Symposium, August 2017. URL: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
2. Baliga, A, Chen, X, and Iftode, L. Paladin: Automated detection and containment of rootkit attacks. Technical report, Rutgers University Department of Computer Science, 2006. URL: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.74.9742&rep=rep1&type=pdf
3. Detecting Kernel-Level Rootkits Using Data Structure Invariants
4. Bharadwaj, R. Mastering Linux Kernel Development. Packt Publishing, 2017. ISBN: 9781785883057.
5. Blunden, William. The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System. Jones and Bartlett Learning, 2012. ISBN: 9781449626372.