Fog computing and its role in the internet of things, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, MCC '12, pp.13-16, 2012. ,
DOI : 10.1145/2342509.2342513
The DISCOV- ERY Initiative -Overcoming Major Limitations of Traditional Server- Centric Clouds by Operating Massively Distributed IaaS Facilities, 2015. ,
Unikernels, ACM SIGPLAN Notices, vol.48, issue.4, pp.461-472, 2013. ,
DOI : 10.1145/2499368.2451167
Side-channel vulnerability factor, ACM SIGARCH Computer Architecture News, vol.40, issue.3, pp.106-117, 2012. ,
DOI : 10.1145/2366231.2337172
Increasing Memory Density by using KSM, Proceedings of the Linux Symposium, pp.19-28, 2009. ,
Memory deduplication as a threat to the guest OS, Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, 2011. ,
DOI : 10.1145/1972551.1972552
Jackpot Stealing Information from Large Caches via Huge Pages, Cryptology ePrint Archive, vol.970, 2014. ,
NoC-Based Protection for SoC Time-Driven Attacks, IEEE Embedded Systems Letters, vol.7, issue.1, pp.7-10, 2015. ,
DOI : 10.1109/LES.2014.2384744
A cache timing attack on aes in virtualization environments, International Conference on Financial Cryptography and Data Security, pp.314-328, 2012. ,
Cache Based Remote Timing Attack on the AES, Cryptographers' Track at the RSA Conference, pp.271-286, 2007. ,
DOI : 10.1007/11967668_18
Cryptanalysis of DES Implemented on Computers with Cache, International Workshop on Cryptographic Hardware and Embedded Systems, pp.62-76, 2003. ,
DOI : 10.1007/978-3-540-45238-6_6
Flush+Flush: A Fast and Stealthy Cache Attack, 2015. ,
DOI : 10.1145/2508859.2516741
URL : http://arxiv.org/abs/1511.04594
Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014. ,
Trace-Driven Cache Attacks on AES (Short Paper), International Conference on Information and Communications Security, pp.112-121, 2006. ,
DOI : 10.1007/11935308_9
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations, International Workshop on Information Security Applications, pp.243-257, 2010. ,
DOI : 10.1007/978-3-540-28632-5_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6567
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009. ,
DOI : 10.1145/1653662.1653687
Cache-Access Pattern Attack on Disaligned AES T-Tables, International Workshop on Constructive Side-Channel Analysis and Secure Design, pp.200-214, 2013. ,
DOI : 10.1007/978-3-642-40026-1_13
Secure multi-party computation, pp.86-97, 1998. ,
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds, Information and Communications Security, pp.361-375, 2016. ,
DOI : 10.1145/2664168.2664179
Bolt: I know what you did last summer... in the cloud, ASPLOS, 2017. ,
A Placement Vulnerability Study in Multi-Tenant Public Clouds, 24th USENIX Security Symposium, pp.913-928, 2015. ,
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds, IFIP International Information Security Conference, pp.388-399, 2012. ,
DOI : 10.1007/978-3-642-30436-1_32
URL : https://hal.archives-ouvertes.fr/hal-01518239
Fast and constant-time implementation of modular exponentiation, 28th International Symposium on Reliable Distributed Systems. Niagara Falls, 2009. ,
Provably Secure Higher-Order Masking of AES, International Workshop on Cryptographic Hardware and Embedded Systems, pp.413-427, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7885
Cache Attacks and Countermeasures: The Case of AES, Cryptographers' Track at the RSA Conference, pp.1-20, 2006. ,
DOI : 10.1007/11605805_1
Preventing Timing Leaks Through Transactional Branching Instructions, Electronic Notes in Theoretical Computer Science, vol.153, issue.2, pp.33-55, 2006. ,
DOI : 10.1016/j.entcs.2005.10.031
URL : http://doi.org/10.1016/j.entcs.2005.10.031
Compiler mitigations for time attacks on modern x86 processors, ACM Transactions on Architecture and Code Optimization, vol.8, issue.4, p.23, 2012. ,
DOI : 10.1145/2086696.2086702
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.306.7302
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors, 2009 30th IEEE Symposium on Security and Privacy, pp.45-60, 2009. ,
DOI : 10.1109/SP.2009.19
Cache-timing attacks on aes, 2005. ,
Robust and efficient elimination of cache and timing side channels, 1506. ,
STEALTHMEM: System- Level Protection Against Cache-Based Side Channel Attacks in the Cloud, 21st USENIX Security Symposium, pp.189-204, 2012. ,
D??ppel, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.827-838, 2013. ,
DOI : 10.1145/2508859.2516741
Scheduler-based defenses against cross-vm side-channels, 23rd USENIX Security Symposium, pp.687-702, 2014. ,
A simple cache partitioning approach in a virtualized environment, IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.519-524, 2009. ,
Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.194-199, 2011. ,
DOI : 10.1109/DSNW.2011.5958812
Eliminating fine grained timers in Xen, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.41-46, 2011. ,
DOI : 10.1145/2046660.2046671
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.4485
Deconstructing new cache designs for thwarting software cache-based side channel attacks, Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, pp.25-34, 2008. ,
DOI : 10.1145/1456508.1456514
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.3129
CATalyst: Defeating last-level cache side channel attacks in cloud computing, 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp.406-418, 2016. ,
DOI : 10.1109/HPCA.2016.7446082
Improve Real-Time Performance Utilizing Cache Allocation Technology, tech. rep, 2015. ,
Towards a Theory of Moving Target Defense, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.31-40, 2014. ,
DOI : 10.1504/IJICS.2007.012248
Moving Target Defense against DDoS Attacks, Proceedings of the 2016 ACM Workshop on Moving Target Defense, MTD'16, pp.93-104, 2016. ,
DOI : 10.1109/SURV.2013.031413.00127
Nomad, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1595-1606, 2015. ,
DOI : 10.1145/1952682.1952700
Entropy, Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, VEE '09, pp.41-50, 2009. ,
DOI : 10.1145/1508293.1508300
URL : https://hal.archives-ouvertes.fr/hal-01102354
Cooperative and reactive scheduling in large-scale virtualized platforms with DVMS, Concurrency and Computation: Practice and Experience, pp.1643-1655, 2013. ,
DOI : 10.1109/SERVICES-I.2009.8
URL : https://hal.archives-ouvertes.fr/hal-00675315
Comparing VM-Placement Algorithms for On-Demand Clouds, 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pp.91-98, 2011. ,
DOI : 10.1109/CloudCom.2011.22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.230.3311