Yoshihiro Oyama. How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. In Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren, editors, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Volume 11543 of Lecture Notes in Computer Science, pages 197-218, Springer, 2019. [doi]
@inproceedings{Oyama19, title = {How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement}, author = {Yoshihiro Oyama}, year = {2019}, doi = {10.1007/978-3-030-22038-9_10}, url = {https://doi.org/10.1007/978-3-030-22038-9_10}, researchr = {https://researchr.org/publication/Oyama19}, cites = {0}, citedby = {0}, pages = {197-218}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, editor = {Roberto Perdisci and Clémentine Maurice and Giorgio Giacinto and Magnus Almgren}, volume = {11543}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-22038-9}, }