Interoperation
User-mode rootkits Modifications to the system at the user-level that hide the attacker and/or provide backdoor access Replace or modify normal binary.
User-mode rootkits
A Programmer’s view on .NET