From Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1: Part 2 Part 3 Part 4 Another one: COM Object hijacking: the discreet way of persistence.
Alternate presentation of last post: http://scarybearsoftware.com/news/malware-persistence/ http://scarybearsoftware.com/news/malware-persistence-2/ http://scarybearsoftware.com/news/malware-persistence-3/