Fog Computing and its Role in the Internet of Things, First ACM Workshop on Mobile Cloud Computing (MCC), pp.13-16, 2012. ,
The DISCOVERY Initiative-Overcoming Major Limitations of Traditional Server-Centric Clouds by Operating Massively Distributed IaaS Facilities, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01203648
Docker: Lightweight Linux Containers for Consistent Development and Deployment, Linux Journal, vol.2014, issue.239, 2014. ,
Unikernels: Library Operating Systems for the Cloud, ACM SIGPLAN Notices, vol.48, issue.4, pp.461-472, 2013. ,
Side-Channel Vulnerability Factor: a Metric for Measuring Information Leakage, ACM SIGARCH Computer Architecture News, vol.40, issue.3, pp.106-117, 2012. ,
Cache Missing for Fun and Profit, Technical BSD Conference (BSDCan), 2005. ,
Increasing Memory Density by using KSM, Proceedings of the Linux Symposium, pp.19-28, 2009. ,
Memory Deduplication as a Threat to the Guest OS, Proceedings of the Fourth ,
DOI : 10.1145/1972551.1972552
URL : http://staff.aist.go.jp/c.artho/papers/EuroSec2011-suzaki.pdf
Cache based remote timing attack on the aes, Cryptographers' Track at the RSA Conference, pp.271-286, 2007. ,
Cryptanalysis of des implemented on computers with cache, International Workshop on Cryptographic Hardware and Embedded Systems, pp.62-76, 2003. ,
DOI : 10.1007/978-3-540-45238-6_6
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-45238-6_6.pdf
Flush+ Flush: A Fast and Stealthy Cache Attack, 2015. ,
DOI : 10.1007/978-3-319-40667-1_14
URL : http://arxiv.org/pdf/1511.04594
Flush+Reload: A High Resolution, Low Noise, L3 Cache Side-Channel Attack, 23rd USENIX Security Symposium, pp.719-732, 2014. ,
Trace-driven cache attacks on aes (short paper), International Conference on Information and Communications Security, pp.112-121, 2006. ,
Improved tracedriven cache-collision attacks against embedded aes implementations, International Workshop on Information Security Applications, pp.243-257, 2010. ,
DOI : 10.1007/978-3-642-17955-6_18
URL : https://eprint.iacr.org/2010/408.pdf
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, pp.199-212, 2009. ,
Cache-access pattern attack on disaligned aes t-tables, International Workshop on Constructive Side-Channel Analysis and Secure Design, pp.200-214, 2013. ,
DOI : 10.1007/978-3-642-40026-1_13
Secure multi-party computation, pp.86-97, 1998. ,
A comprehensive study of co-residence threat in multitenant public paas clouds, Information and Communications Security, pp.361-375, 2016. ,
Bolt: I know what you did last summer... in the cloud, ASPLOS, 2017. ,
A Placement Vulnerability Study in Multi-Tenant Public Clouds, 24th USENIX Security Symposium, pp.913-928, 2015. ,
Incentive compatible moving target defense against vm-colocation attacks in clouds, IFIP International Information Security Conference, pp.388-399, 2012. ,
DOI : 10.1007/978-3-642-30436-1_32
URL : https://hal.archives-ouvertes.fr/hal-01518239
Fast and constant-time implementation of modular exponentiation, 28th International Symposium on Reliable Distributed Systems, 2009. ,
Provably secure higher-order masking of aes, International Workshop on Cryptographic Hardware and Embedded Systems, pp.413-427, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-15031-9_28.pdf
Cache attacks and countermeasures: the case of aes, Cryptographers' Track at the RSA Conference, pp.1-20, 2006. ,
DOI : 10.1007/11605805_1
URL : http://eprint.iacr.org/2005/271.ps.gz
Preventing timing leaks through transactional branching instructions, Electronic Notes in Theoretical Computer Science, vol.153, issue.2, pp.33-55, 2006. ,
DOI : 10.1016/j.entcs.2005.10.031
URL : https://doi.org/10.1016/j.entcs.2005.10.031
Compiler mitigations for time attacks on modern x86 processors, ACM Transactions on Architecture and Code Optimization (TACO), vol.8, issue.4, p.23, 2012. ,
DOI : 10.1145/2086696.2086702
URL : http://users.elis.ugent.be/~brdsutte/research/publications/2012TACOvancleemput.pdf
Practical mitigations for timing-based side-channel attacks on modern x86 processors, 30th IEEE Symposium on Security and Privacy, pp.45-60, 2009. ,
DOI : 10.1109/sp.2009.19
URL : http://www.elis.rug.ac.be/%7Ebrdsutte/research/publications/2009SPcoppens.pdf
Cache-timing attacks on aes, 2005. ,
Robust and efficient elimination of cache and timing side channels, CoRR, 2015. ,
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud, 21st USENIX Security Symposium, pp.189-204, 2012. ,
Duppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud, ACM Conference on Computer and Communications Security (CCS), pp.827-838, 2013. ,
Scheduler-based defenses against cross-vm side-channels, 23rd USENIX Security Symposium, pp.687-702, 2014. ,
A simple cache partitioning approach in a virtualized environment, IEEE International Symposium on ,
Deconstructing new cache designs for thwarting software cache-based side channel attacks, Proceedings of the 2nd ACM Workshop on Computer Security Architectures, pp.25-34, 2008. ,
DOI : 10.1145/1456508.1456514
URL : http://www.cs.ucf.edu/~jfkong/CSAW08.pdf
Catalyst: Defeating last-level cache side channel attacks in cloud computing, IEEE International Symposium on High Performance Computer Architecture (HPCA), pp.406-418, 2016. ,
DOI : 10.1109/hpca.2016.7446082
Improve Real-Time Performance Utilizing Cache Allocation Technology, tech. rep, 2015. ,
Towards a theory of moving target defense, Proceedings of the First ACM Workshop on Moving Target Defense, pp.31-40, 2014. ,
Moving target defense against ddos attacks: An empirical gametheoretic analysis, Proceedings of the 2016 ACM Workshop on Moving Target Defense, pp.93-104, 2016. ,
DOI : 10.1145/2995272.2995279
Nomad: Mitigating arbitrary cloud side channels via provider-assisted migration, Proceedings of the 22nd acm sigsac conference on computer and communications security, pp.1595-1606, 2015. ,
Entropy: a consolidation manager for clusters, Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pp.41-50, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00320204
Cooperative and reactive scheduling in large-scale virtualized platforms with dvms, Concurrency and Computation: Practice and Experience, vol.25, issue.12, pp.1643-1655, 2013. ,
DOI : 10.1002/cpe.2848
URL : https://hal.archives-ouvertes.fr/hal-00675315
Comparing vmplacement algorithms for on-demand clouds, Cloud Computing Technology and Science (CloudCom), pp.91-98, 2011. ,
DOI : 10.1109/cloudcom.2011.22
URL : http://www.nist.gov/itl/antd/upload/4622a091.pdf