Adding Virtualization Capabilities to the Grid???5000 Testbed, Cloud Computing and Services Science of Communications in Computer and Information Science, pp.3-20, 2013. ,
DOI : 10.1007/978-3-319-04519-1_1
URL : https://hal.archives-ouvertes.fr/hal-00946971
hwloc: A Generic Framework for Managing Hardware Affinities in HPC Applications, 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, pp.180-186, 2010. ,
DOI : 10.1109/PDP.2010.67
URL : https://hal.archives-ouvertes.fr/inria-00429889
Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints, 2014 IEEE 7th International Conference on Cloud Computing, 2014. ,
DOI : 10.1109/CLOUD.2014.19
URL : https://hal.archives-ouvertes.fr/hal-00924296
Approximation algorithms for np-hard problems. chapter Approximation Algorithms for Bin Packing: A Survey, pp.46-93, 1997. ,
Sidechannel vulnerability factor: A metric for measuring information leakage, 2012 39th Annual International Symposium on Computer Architecture (ISCA), pp.106-117, 2012. ,
Outlook: Cloudy with a Chance of Security Challenges and Improvements, IEEE Security & Privacy Magazine, vol.8, issue.1, pp.77-80, 2010. ,
DOI : 10.1109/MSP.2010.45
Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-Aware Virtual Machine Placement, 2011 IEEE International Conference on Services Computing, pp.72-79, 2011. ,
DOI : 10.1109/SCC.2011.28
NoHype, ACM SIGARCH Computer Architecture News, vol.38, issue.3, pp.350-361, 2010. ,
DOI : 10.1145/1816038.1816010
Heuristics for solving the bin-packing problem with conflicts, Applied Mathematical Sciences, vol.5, issue.35, pp.1739-1752, 2011. ,
Portable tools for performance analysis, USENIX annual technical conference, pp.279-294, 1996. ,
Load-based covert channels between Xen virtual machines, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, p.173180, 2010. ,
DOI : 10.1145/1774088.1774125
Resource management for isolation enhanced cloud services, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, p.77, 2009. ,
DOI : 10.1145/1655008.1655019
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009. ,
DOI : 10.1145/1653662.1653687
The Prisoners??? Problem and the Subliminal Channel, Advances in Cryptology: Proceedings of CRYPTO '83, pp.51-67, 1983. ,
DOI : 10.1007/978-1-4684-4730-9_5
System-Level Protection Against Cache-based Side Channel Attacks in the Cloud, Proceedings of the 21st Usenix Security Symposium, USENIX Security'12, pp.1-16 ,
Resource-freeing attacks, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.281-292, 2012. ,
DOI : 10.1145/2382196.2382228
Covert and Side Channels Due to Processor Architecture, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.473-482, 2006. ,
DOI : 10.1109/ACSAC.2006.20
Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines, 2011 IEEE 4th International Conference on Cloud Computing, pp.283-291, 2011. ,
DOI : 10.1109/CLOUD.2011.10
Whispers in the hyper-space: high-speed covert channel attacks in the cloud, Proceedings of the 21st USENIX conference on Security symposium, Security'12, pp.9-9 ,
An exploration of L2 cache covert channels in virtualized environments, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, p.2940, 2011. ,
DOI : 10.1145/2046660.2046670
Side channel vulnerability metrics, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, pp.1-2, 2013. ,
DOI : 10.1145/2487726.2487728
HomeAlone: Coresidency detection in the cloud via side-channel analysis, 2011 IEEE Symposium on Security and Privacy (SP), pp.313-328, 2011. ,