D. Balouek, A. Carpen-amarie, G. Charrier, F. Desprez, E. Jeannot et al., Adding Virtualization Capabilities to the Grid???5000 Testbed, Cloud Computing and Services Science of Communications in Computer and Information Science, pp.3-20, 2013.
DOI : 10.1007/978-3-319-04519-1_1

URL : https://hal.archives-ouvertes.fr/hal-00946971

F. Broquedis, J. Clet-ortega, S. Moreaud, N. Furmento, B. Goglin et al., hwloc: A Generic Framework for Managing Hardware Affinities in HPC Applications, 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, pp.180-186, 2010.
DOI : 10.1109/PDP.2010.67

URL : https://hal.archives-ouvertes.fr/inria-00429889

E. Caron and J. Rouzaud-cornabas, Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints, 2014 IEEE 7th International Conference on Cloud Computing, 2014.
DOI : 10.1109/CLOUD.2014.19

URL : https://hal.archives-ouvertes.fr/hal-00924296

E. G. Coffman, J. , M. R. Garey, and D. S. Johnson, Approximation algorithms for np-hard problems. chapter Approximation Algorithms for Bin Packing: A Survey, pp.46-93, 1997.

J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan, Sidechannel vulnerability factor: A metric for measuring information leakage, 2012 39th Annual International Symposium on Computer Architecture (ISCA), pp.106-117, 2012.

T. Jaeger and J. Schiffman, Outlook: Cloudy with a Chance of Security Challenges and Improvements, IEEE Security & Privacy Magazine, vol.8, issue.1, pp.77-80, 2010.
DOI : 10.1109/MSP.2010.45

D. Jayasinghe, C. Pu, T. Eilam, M. Steinder, I. Whally et al., Improving Performance and Availability of Services Hosted on IaaS Clouds with Structural Constraint-Aware Virtual Machine Placement, 2011 IEEE International Conference on Services Computing, pp.72-79, 2011.
DOI : 10.1109/SCC.2011.28

E. Keller, J. Szefer, J. Rexford, and R. B. Lee, NoHype, ACM SIGARCH Computer Architecture News, vol.38, issue.3, pp.350-361, 2010.
DOI : 10.1145/1816038.1816010

M. Maiza and M. S. Radjef, Heuristics for solving the bin-packing problem with conflicts, Applied Mathematical Sciences, vol.5, issue.35, pp.1739-1752, 2011.

L. W. Mcvoy and C. Staelin, Portable tools for performance analysis, USENIX annual technical conference, pp.279-294, 1996.

K. Okamura and Y. Oyama, Load-based covert channels between Xen virtual machines, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, p.173180, 2010.
DOI : 10.1145/1774088.1774125

H. Raj, R. Nathuji, and A. Singh, Resource management for isolation enhanced cloud services, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, p.77, 2009.
DOI : 10.1145/1655008.1655019

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009.
DOI : 10.1145/1653662.1653687

G. J. Simmons, The Prisoners??? Problem and the Subliminal Channel, Advances in Cryptology: Proceedings of CRYPTO '83, pp.51-67, 1983.
DOI : 10.1007/978-1-4684-4730-9_5

K. Taesoo, M. Peinado, and G. Mainar-ruiz, System-Level Protection Against Cache-based Side Channel Attacks in the Cloud, Proceedings of the 21st Usenix Security Symposium, USENIX Security'12, pp.1-16

V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. M. Swift, Resource-freeing attacks, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.281-292, 2012.
DOI : 10.1145/2382196.2382228

Z. Wang and R. Lee, Covert and Side Channels Due to Processor Architecture, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.473-482, 2006.
DOI : 10.1109/ACSAC.2006.20

J. Wu, L. Ding, Y. Wang, and W. Han, Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines, 2011 IEEE 4th International Conference on Cloud Computing, pp.283-291, 2011.
DOI : 10.1109/CLOUD.2011.10

Z. Wu, Z. Xu, and H. Wang, Whispers in the hyper-space: high-speed covert channel attacks in the cloud, Proceedings of the 21st USENIX conference on Security symposium, Security'12, pp.9-9

Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen et al., An exploration of L2 cache covert channels in virtualized environments, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, p.2940, 2011.
DOI : 10.1145/2046660.2046670

T. Zhang, F. Liu, S. Chen, and R. B. Lee, Side channel vulnerability metrics, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, pp.1-2, 2013.
DOI : 10.1145/2487726.2487728

Y. Zhang, A. Juels, A. Oprea, and M. Reiter, HomeAlone: Coresidency detection in the cloud via side-channel analysis, 2011 IEEE Symposium on Security and Privacy (SP), pp.313-328, 2011.