F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, Fog Computing and its Role in the Internet of Things, First ACM Workshop on Mobile Cloud Computing (MCC), pp.13-16, 2012.

A. Lebre, J. Pastor, and . Consortium, The DISCOVERY Initiative-Overcoming Major Limitations of Traditional Server-Centric Clouds by Operating Massively Distributed IaaS Facilities, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01203648

D. Merkel, Docker: Lightweight Linux Containers for Consistent Development and Deployment, Linux Journal, vol.2014, issue.239, 2014.

A. Madhavapeddy, R. Mortier, C. Rotsos, D. Scott, B. Singh et al., Unikernels: Library Operating Systems for the Cloud, ACM SIGPLAN Notices, vol.48, issue.4, pp.461-472, 2013.

J. Demme, R. Martin, A. Waksman, and S. Sethumadhavan, Side-Channel Vulnerability Factor: a Metric for Measuring Information Leakage, ACM SIGARCH Computer Architecture News, vol.40, issue.3, pp.106-117, 2012.

C. , Cache Missing for Fun and Profit, Technical BSD Conference (BSDCan), 2005.

A. Arcangeli, I. Eidus, and C. Wright, Increasing Memory Density by using KSM, Proceedings of the Linux Symposium, pp.19-28, 2009.

K. Suzaki, K. Iijima, T. Yagi, and C. Artho, Memory Deduplication as a Threat to the Guest OS, Proceedings of the Fourth
DOI : 10.1145/1972551.1972552

URL : http://staff.aist.go.jp/c.artho/papers/EuroSec2011-suzaki.pdf

O. Ac?içmez, W. Schindler, and C. ¸. Koç, Cache based remote timing attack on the aes, Cryptographers' Track at the RSA Conference, pp.271-286, 2007.

Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi, Cryptanalysis of des implemented on computers with cache, International Workshop on Cryptographic Hardware and Embedded Systems, pp.62-76, 2003.
DOI : 10.1007/978-3-540-45238-6_6

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-45238-6_6.pdf

D. Gruss, C. Maurice, K. Wagner, and S. Mangard, Flush+ Flush: A Fast and Stealthy Cache Attack, 2015.
DOI : 10.1007/978-3-319-40667-1_14

URL : http://arxiv.org/pdf/1511.04594

Y. Yarom and K. Falkner, Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014.

O. Ac?içmez and C. ¸. Koç, Trace-driven cache attacks on aes (short paper), International Conference on Information and Communications Security, pp.112-121, 2006.

J. Gallais, I. Kizhvatov, and M. Tunstall, Improved tracedriven cache-collision attacks against embedded aes implementations, International Workshop on Information Security Applications, pp.243-257, 2010.
DOI : 10.1007/978-3-642-17955-6_18

URL : https://eprint.iacr.org/2010/408.pdf

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, pp.199-212, 2009.

R. Spreitzer and T. Plos, Cache-access pattern attack on disaligned aes t-tables, International Workshop on Constructive Side-Channel Analysis and Secure Design, pp.200-214, 2013.
DOI : 10.1007/978-3-642-40026-1_13

O. Goldreich, Secure multi-party computation, pp.86-97, 1998.

W. Zhang, X. Jia, C. Wang, S. Zhang, Q. Huang et al., A comprehensive study of co-residence threat in multitenant public paas clouds, Information and Communications Security, pp.361-375, 2016.

C. Delimitrou and C. E. Kozyrakis, Bolt: I know what you did last summer... in the cloud, ASPLOS, 2017.

V. Varadarajan, Y. Zhang, T. Ristenpart, and M. M. Swift, A Placement Vulnerability Study in Multi-Tenant Public Clouds, 24th USENIX Security Symposium, pp.913-928, 2015.

Y. Zhang, M. Li, K. Bai, M. Yu, and W. Zang, Incentive compatible moving target defense against vm-colocation attacks in clouds, IFIP International Information Security Conference, pp.388-399, 2012.
DOI : 10.1007/978-3-642-30436-1_32

URL : https://hal.archives-ouvertes.fr/hal-01518239

V. Gopal, J. Guilford, E. Ozturk, W. Feghali, G. Wolrich et al., Fast and constant-time implementation of modular exponentiation, 28th International Symposium on Reliable Distributed Systems, 2009.

M. Rivain and E. Prouff, Provably secure higher-order masking of aes, International Workshop on Cryptographic Hardware and Embedded Systems, pp.413-427, 2010.
DOI : 10.1007/978-3-642-15031-9_28

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-15031-9_28.pdf

D. A. Osvik, A. Shamir, and E. Tromer, Cache attacks and countermeasures: the case of aes, Cryptographers' Track at the RSA Conference, pp.1-20, 2006.
DOI : 10.1007/11605805_1

URL : http://eprint.iacr.org/2005/271.ps.gz

G. Barthe, T. Rezk, and M. Warnier, Preventing timing leaks through transactional branching instructions, Electronic Notes in Theoretical Computer Science, vol.153, issue.2, pp.33-55, 2006.
DOI : 10.1016/j.entcs.2005.10.031

URL : https://doi.org/10.1016/j.entcs.2005.10.031

J. V. Cleemput, B. Coppens, and B. D. Sutter, Compiler mitigations for time attacks on modern x86 processors, ACM Transactions on Architecture and Code Optimization (TACO), vol.8, issue.4, p.23, 2012.
DOI : 10.1145/2086696.2086702

URL : http://users.elis.ugent.be/~brdsutte/research/publications/2012TACOvancleemput.pdf

B. Coppens, I. Verbauwhede, K. De-bosschere, and B. D. Sutter, Practical mitigations for timing-based side-channel attacks on modern x86 processors, 30th IEEE Symposium on Security and Privacy, pp.45-60, 2009.
DOI : 10.1109/sp.2009.19

URL : http://www.elis.rug.ac.be/%7Ebrdsutte/research/publications/2009SPcoppens.pdf

D. J. Bernstein, Cache-timing attacks on aes, 2005.

B. A. Braun, S. Jana, and D. Boneh, Robust and efficient elimination of cache and timing side channels, CoRR, 2015.

T. Kim, M. Peinado, and G. Mainar-ruiz, STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud, 21st USENIX Security Symposium, pp.189-204, 2012.

Y. Zhang and M. K. Reiter, Duppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud, ACM Conference on Computer and Communications Security (CCS), pp.827-838, 2013.

V. Varadarajan, T. Ristenpart, and M. Swift, Scheduler-based defenses against cross-vm side-channels, 23rd USENIX Security Symposium, pp.687-702, 2014.

J. Xinxin, A simple cache partitioning approach in a virtualized environment, IEEE International Symposium on

J. Kong, Deconstructing new cache designs for thwarting software cache-based side channel attacks, Proceedings of the 2nd ACM Workshop on Computer Security Architectures, pp.25-34, 2008.
DOI : 10.1145/1456508.1456514

URL : http://www.cs.ucf.edu/~jfkong/CSAW08.pdf

F. Liu, Catalyst: Defeating last-level cache side channel attacks in cloud computing, IEEE International Symposium on High Performance Computer Architecture (HPCA), pp.406-418, 2016.
DOI : 10.1109/hpca.2016.7446082

. Intel, Improve Real-Time Performance Utilizing Cache Allocation Technology, tech. rep, 2015.

R. Zhuang, S. A. Deloach, and X. Ou, Towards a theory of moving target defense, Proceedings of the First ACM Workshop on Moving Target Defense, pp.31-40, 2014.

M. Wright, S. Venkatesan, M. Albanese, and M. P. Wellman, Moving target defense against ddos attacks: An empirical gametheoretic analysis, Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp.93-104, 2016.
DOI : 10.1145/2995272.2995279

S. Moon, V. Sekar, and M. K. Reiter, Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration, Proceedings of the 22nd acm sigsac conference on computer and communications security, pp.1595-1606, 2015.

F. Hermenier, X. Lorca, J. Menaud, G. Muller, and J. Lawall, Entropy: a consolidation manager for clusters, Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pp.41-50, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00320204

F. Quesnel, A. , and M. Südholt, Cooperative and reactive scheduling in large-scale virtualized platforms with dvms, Concurrency and Computation: Practice and Experience, vol.25, issue.12, pp.1643-1655, 2013.
DOI : 10.1002/cpe.2848

URL : https://hal.archives-ouvertes.fr/hal-00675315

K. Mills, J. Filliben, and C. Dabrowski, Comparing vmplacement algorithms for on-demand clouds, Cloud Computing Technology and Science (CloudCom), pp.91-98, 2011.
DOI : 10.1109/cloudcom.2011.22

URL : http://www.nist.gov/itl/antd/upload/4622a091.pdf