[rwth-security] Stealth in 100 Lines: Analyzing PAM Backdoors in Linux