F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, Fog computing and its role in the internet of things, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, MCC '12, pp.13-16, 2012.
DOI : 10.1145/2342509.2342513

A. Lebre, J. Pastor, and . Consortium, The DISCOV- ERY Initiative -Overcoming Major Limitations of Traditional Server- Centric Clouds by Operating Massively Distributed IaaS Facilities, 2015.

A. Madhavapeddy, R. Mortier, C. Rotsos, D. Scott, B. Singh et al., Unikernels, ACM SIGPLAN Notices, vol.48, issue.4, pp.461-472, 2013.
DOI : 10.1145/2499368.2451167

J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan, Side-channel vulnerability factor, ACM SIGARCH Computer Architecture News, vol.40, issue.3, pp.106-117, 2012.
DOI : 10.1145/2366231.2337172

A. Arcangeli, I. Eidus, and C. Wright, Increasing Memory Density by using KSM, Proceedings of the Linux Symposium, pp.19-28, 2009.

K. Suzaki, K. Iijima, T. Yagi, and C. Artho, Memory deduplication as a threat to the guest OS, Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, 2011.
DOI : 10.1145/1972551.1972552

G. I. Apecechea, T. Eisenbarth, and B. Sunar, Jackpot Stealing Information from Large Caches via Huge Pages, Cryptology ePrint Archive, vol.970, 2014.

M. J. Sepúlveda, J. Diguet, M. Strum, and G. Gogniat, NoC-Based Protection for SoC Time-Driven Attacks, IEEE Embedded Systems Letters, vol.7, issue.1, pp.7-10, 2015.
DOI : 10.1109/LES.2014.2384744

M. Weiß, B. Heinz, and F. Stumpf, A cache timing attack on aes in virtualization environments, International Conference on Financial Cryptography and Data Security, pp.314-328, 2012.

O. Ac?içmez, W. Schindler, and C. ¸. Koç, Cache Based Remote Timing Attack on the AES, Cryptographers' Track at the RSA Conference, pp.271-286, 2007.
DOI : 10.1007/11967668_18

Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi, Cryptanalysis of DES Implemented on Computers with Cache, International Workshop on Cryptographic Hardware and Embedded Systems, pp.62-76, 2003.
DOI : 10.1007/978-3-540-45238-6_6

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+Flush: A Fast and Stealthy Cache Attack, 2015.
DOI : 10.1145/2508859.2516741

URL : http://arxiv.org/abs/1511.04594

Y. Yarom and K. Falkner, Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014.

O. Ac?içmez and C. ¸. Koç, Trace-Driven Cache Attacks on AES (Short Paper), International Conference on Information and Communications Security, pp.112-121, 2006.
DOI : 10.1007/11935308_9

J. Gallais, I. Kizhvatov, and M. Tunstall, Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations, International Workshop on Information Security Applications, pp.243-257, 2010.
DOI : 10.1007/978-3-540-28632-5_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6567

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009.
DOI : 10.1145/1653662.1653687

R. Spreitzer and T. Plos, Cache-Access Pattern Attack on Disaligned AES T-Tables, International Workshop on Constructive Side-Channel Analysis and Secure Design, pp.200-214, 2013.
DOI : 10.1007/978-3-642-40026-1_13

O. Goldreich, Secure multi-party computation, pp.86-97, 1998.

W. Zhang, X. Jia, C. Wang, S. Zhang, Q. Huang et al., A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds, Information and Communications Security, pp.361-375, 2016.
DOI : 10.1145/2664168.2664179

C. Delimitrou and C. E. Kozyrakis, Bolt: I know what you did last summer... in the cloud, ASPLOS, 2017.

V. Varadarajan, Y. Zhang, T. Ristenpart, and M. M. Swift, A Placement Vulnerability Study in Multi-Tenant Public Clouds, 24th USENIX Security Symposium, pp.913-928, 2015.

Y. Zhang, M. Li, K. Bai, M. Yu, and W. Zang, Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds, IFIP International Information Security Conference, pp.388-399, 2012.
DOI : 10.1007/978-3-642-30436-1_32

URL : https://hal.archives-ouvertes.fr/hal-01518239

V. Gopal, J. Guilford, E. Ozturk, W. Feghali, G. Wolrich et al., Fast and constant-time implementation of modular exponentiation, 28th International Symposium on Reliable Distributed Systems. Niagara Falls, 2009.

M. Rivain and E. Prouff, Provably Secure Higher-Order Masking of AES, International Workshop on Cryptographic Hardware and Embedded Systems, pp.413-427, 2010.
DOI : 10.1007/978-3-642-15031-9_28

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7885

D. A. Osvik, A. Shamir, and E. Tromer, Cache Attacks and Countermeasures: The Case of AES, Cryptographers' Track at the RSA Conference, pp.1-20, 2006.
DOI : 10.1007/11605805_1

G. Barthe, T. Rezk, and M. Warnier, Preventing Timing Leaks Through Transactional Branching Instructions, Electronic Notes in Theoretical Computer Science, vol.153, issue.2, pp.33-55, 2006.
DOI : 10.1016/j.entcs.2005.10.031

URL : http://doi.org/10.1016/j.entcs.2005.10.031

J. V. Cleemput, B. Coppens, and B. Sutter, Compiler mitigations for time attacks on modern x86 processors, ACM Transactions on Architecture and Code Optimization, vol.8, issue.4, p.23, 2012.
DOI : 10.1145/2086696.2086702

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.7302

B. Coppens, I. Verbauwhede, K. De-bosschere, and B. Sutter, Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors, 2009 30th IEEE Symposium on Security and Privacy, pp.45-60, 2009.
DOI : 10.1109/SP.2009.19

D. J. Bernstein, Cache-timing attacks on aes, 2005.

B. A. Braun, S. Jana, and D. Boneh, Robust and efficient elimination of cache and timing side channels, 1506.

T. Kim, M. Peinado, and G. Mainar-ruiz, STEALTHMEM: System- Level Protection Against Cache-Based Side Channel Attacks in the Cloud, 21st USENIX Security Symposium, pp.189-204, 2012.

Y. Zhang and M. K. Reiter, D??ppel, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.827-838, 2013.
DOI : 10.1145/2508859.2516741

V. Varadarajan, T. Ristenpart, and M. Swift, Scheduler-based defenses against cross-vm side-channels, 23rd USENIX Security Symposium, pp.687-702, 2014.

J. Xinxin, A simple cache partitioning approach in a virtualized environment, IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.519-524, 2009.

J. Shi, X. Song, H. Chen, and B. Zang, Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.194-199, 2011.
DOI : 10.1109/DSNW.2011.5958812

B. Vattikonda, S. Das, and H. Shacham, Eliminating fine grained timers in Xen, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.41-46, 2011.
DOI : 10.1145/2046660.2046671

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.4485

J. Kong, Deconstructing new cache designs for thwarting software cache-based side channel attacks, Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, pp.25-34, 2008.
DOI : 10.1145/1456508.1456514

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.3129

F. Liu, CATalyst: Defeating last-level cache side channel attacks in cloud computing, 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp.406-418, 2016.
DOI : 10.1109/HPCA.2016.7446082

. Intel, Improve Real-Time Performance Utilizing Cache Allocation Technology, tech. rep, 2015.

R. Zhuang, S. A. Deloach, and X. Ou, Towards a Theory of Moving Target Defense, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.31-40, 2014.
DOI : 10.1504/IJICS.2007.012248

M. Wright, S. Venkatesan, M. Albanese, and M. P. Wellman, Moving Target Defense against DDoS Attacks, Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD'16, pp.93-104, 2016.
DOI : 10.1109/SURV.2013.031413.00127

S. Moon, V. Sekar, and M. K. Reiter, Nomad, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1595-1606, 2015.
DOI : 10.1145/1952682.1952700

F. Hermenier, X. Lorca, J. Menaud, G. Muller, and J. Lawall, Entropy, Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, VEE '09, pp.41-50, 2009.
DOI : 10.1145/1508293.1508300

URL : https://hal.archives-ouvertes.fr/hal-01102354

F. Quesnel, A. , and M. Südholt, Cooperative and reactive scheduling in large-scale virtualized platforms with DVMS, Concurrency and Computation: Practice and Experience, pp.1643-1655, 2013.
DOI : 10.1109/SERVICES-I.2009.8

URL : https://hal.archives-ouvertes.fr/hal-00675315

K. Mills, J. Filliben, and C. Dabrowski, Comparing VM-Placement Algorithms for On-Demand Clouds, 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pp.91-98, 2011.
DOI : 10.1109/CloudCom.2011.22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.230.3311