M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.
DOI : 10.1109/SP.2009.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.331.9096

A. Benoit, U. V. , Y. Robert, and E. Saule, A survey of pipelined workflow scheduling, ACM Computing Surveys, vol.45, issue.4, pp.1-5036, 2013.
DOI : 10.1145/2501654.2501664

URL : https://hal.archives-ouvertes.fr/hal-00521712

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, Theoretical Computer Science, vol.597, pp.62-87, 2015.
DOI : 10.1016/j.tcs.2015.07.034

URL : https://hal.archives-ouvertes.fr/hal-01088193

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, LNCS, vol.8044, pp.702-707, 2013.
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, ESORICS, pp.219-236, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

V. Costan and S. Devadas, Intel sgx explained, IACR ePrint Archive, p.86, 2016.

R. L. Graham, Bounds for certain multiprocessing anomalies. The Bell System Technical Journal, pp.1563-1581, 1966.
DOI : 10.1002/j.1538-7305.1966.tb01709.x

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+Flush: A Fast and Stealthy Cache Attack, DIMVA, pp.279-299, 2016.
DOI : 10.1145/2508859.2516741

URL : http://arxiv.org/abs/1511.04594

D. Gruss, R. Spreitzer, and S. Mangard, Cache template attacks: Automating attacks on inclusive last-level caches, Usenix Security, pp.897-912, 2015.

J. Heusser and P. Malacaria, Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010.
DOI : 10.1145/1920261.1920300

J. H. Kim, A. Legay, K. G. Larsen, M. Mikucionis, and B. Nielsen, Resource-Parameterized Timing Analysis of Real-Time Systems, In HVC, pp.190-205, 2015.
DOI : 10.1007/978-3-319-26287-1_12

J. H. Kim, A. Legay, L. Traonouez, A. Boudjadar, U. Nyman et al., Optimizing the resource requirements of hierarchical scheduling systems, ACM SIGBED Review, vol.13, issue.3, pp.41-48, 2016.
DOI : 10.1109/ECRTS.2008.28

URL : https://hal.archives-ouvertes.fr/hal-01406459

S. Mohan, M. Yoon, R. Pellizzoni, and R. Bobba, Real-Time Systems Security through Scheduler Constraints, 2014 26th Euromicro Conference on Real-Time Systems, pp.129-140, 2014.
DOI : 10.1109/ECRTS.2014.28

D. A. Osvik, A. Shamir, and E. Tromer, Cache Attacks and Countermeasures: The Case of AES, Cryptographers Track at the RSA Conference, pp.1-20, 2006.
DOI : 10.1007/11605805_1

R. Pellizzoni, N. Paryab, M. Yoon, S. Bak, S. Mohan et al., A generalized model for preventing information leakage in hard real-time systems, 21st IEEE Real-Time and Embedded Technology and Applications Symposium, 2015.
DOI : 10.1109/RTAS.2015.7108450

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653687

M. Schwarz, S. Weiser, D. Gruss, C. Maurice, and S. Mangard, Malware guard extension: Using sgx to conceal cache attacks. arXiv preprint, 2017.
DOI : 10.1007/978-3-319-60876-1_1

J. Son and J. Alves-foss, Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems, In IASTED, pp.13-18, 2006.

S. H. Son, R. Mukkamala, and R. David, Integrating security and real-time requirements using covert channel capacity, IEEE Transactions on Knowledge and Data Engineering, vol.12, issue.6, pp.865-879, 2000.
DOI : 10.1109/69.895799

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.2362

E. Tromer, D. A. Osvik, and A. Shamir, Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010.
DOI : 10.1007/978-3-540-45238-6_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.1984

C. G. Val, M. A. Enescu, S. Bayless, W. Aiello, and A. J. Hu, Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 2016.
DOI : 10.1109/EuroSP.2016.15

V. Varadarajan, T. Ristenpart, and M. M. Swift, Scheduler-based defenses against cross-vm side-channels, Usenix Security, pp.687-702, 2014.

Y. Yarom and K. Falkner, FLUSH+RELOAD: A high resolution, low noise, L3 cache sidechannel attack, USENIX Security, pp.719-732, 2014.

M. Yoon, S. Mohan, C. Chen, and L. Sha, TaskShuffler: A Schedule Randomization Protocol for Obfuscation against Timing Inference Attacks in Real-Time Systems, 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp.1-12, 2016.
DOI : 10.1109/RTAS.2016.7461362