How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement

Yoshihiro Oyama. How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. In Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren, editors, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Volume 11543 of Lecture Notes in Computer Science, pages 197-218, Springer, 2019. [doi]

@inproceedings{Oyama19,
  title = {How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement},
  author = {Yoshihiro Oyama},
  year = {2019},
  doi = {10.1007/978-3-030-22038-9_10},
  url = {https://doi.org/10.1007/978-3-030-22038-9_10},
  researchr = {https://researchr.org/publication/Oyama19},
  cites = {0},
  citedby = {0},
  pages = {197-218},
  booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings},
  editor = {Roberto Perdisci and Clémentine Maurice and Giorgio Giacinto and Magnus Almgren},
  volume = {11543},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-030-22038-9},
}