Detecting stealth software with Strider GhostBuster | IEEE Conference Publication | IEEE Xplore