During a high-stakes malware investigation, your team discovered a suspicious device driver on a compromised server. Upon analyzing the driver ' s behavior in a sandboxed environment, you notice that it is frequently accessing low-level system resources that are not typically needed by legitimate drivers. You suspect that this driver might be used as a rootkit. What technique might the rootkit be employed to evade detection?
Submit