How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement

Yoshihiro Oyama. How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. In Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren, editors, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Volume 11543 of Lecture Notes in Computer Science, pages 197-218, Springer, 2019. [doi]

Abstract

Abstract is missing.