Ciphering (i guess you meant encryption) would be too complicating to implement in a way when its integrated with 2 other technologies. And it has a weak point always - it is the encryption key - which you need to save somewhere to be able to de-cipher next block of code. If your code knows where the key is, then the analyst knows that too. That said, i'm not sure if the encryption worth the investment to integrate.
1) Scenario, where researcher can't suspend live system, would be that it is critical infrastructure system, and suspending such system is not an option until the alternative system is created to maintain needed critical functionality. And this will cost a lot of money and time. Of course, this is not everyday's scenario, but it is not impossible either (think of stuxnet).
2) Rootkit mission is to hide unauthorized activity on system. That mean, rootkit's aim is to extend payload lifecycle as much as possible. The longer it's undetected -> the longer it's not dumped/analysed -> the longer it's not removed from system -> the longer it's executing it's payload -> the more chances it's achieved it's goal. It's not always critical to have 'good system control' as long as rootkit performes it's tasks. Some tasks can be performed without callbacks, hooks, threads.
Though, you are right in the point that such tasks will be very limited in what they can do.
1) Scenario, where researcher can't suspend live system, would be that it is critical infrastructure system, and suspending such system is not an option until the alternative system is created to maintain needed critical functionality. And this will cost a lot of money and time. Of course, this is not everyday's scenario, but it is not impossible either (think of stuxnet).
2) Rootkit mission is to hide unauthorized activity on system. That mean, rootkit's aim is to extend payload lifecycle as much as possible. The longer it's undetected -> the longer it's not dumped/analysed -> the longer it's not removed from system -> the longer it's executing it's payload -> the more chances it's achieved it's goal. It's not always critical to have 'good system control' as long as rootkit performes it's tasks. Some tasks can be performed without callbacks, hooks, threads.
Though, you are right in the point that such tasks will be very limited in what they can do.