Z. Afoulki, A. Bousquet, and J. Rouzaud-cornabas, A security-aware scheduler for virtual machines on iaas clouds, Report, 2011.

S. Al-haj, E. Al-shaer, and H. V. Ramasamy, Security-Aware Resource Allocation in Clouds, 2013 IEEE International Conference on Services Computing, pp.400-407, 2013.
DOI : 10.1109/SCC.2013.36

M. Alicherry and T. V. Lakshman, Optimizing data access latencies in cloud systems by intelligent virtual machine placement, 2013 Proceedings IEEE INFOCOM, pp.647-655, 2013.
DOI : 10.1109/INFCOM.2013.6566850

P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris et al., Xen and the art of virtualization, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.164-177, 2003.
DOI : 10.1145/1165389.945462

E. Bin, O. Biran, O. Boni, E. Hadad, E. K. Kolodner et al., Guaranteeing High Availability Goals for Virtual Machine Placement, 2011 31st International Conference on Distributed Computing Systems, pp.700-709, 2011.
DOI : 10.1109/ICDCS.2011.72

E. Caron, A. D. Le, A. Lefray, and C. Toinard, Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement Algorithms, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.125-131, 2013.
DOI : 10.1109/CyberC.2013.28

URL : https://hal.archives-ouvertes.fr/hal-00932401

K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, A fast and elitist multiobjective genetic algorithm: NSGA-II, ) 11. default, M.: Kernel based virtual machine, pp.182-197, 2002.
DOI : 10.1109/4235.996017

URL : http://work.caltech.edu/amrit/papers/nsga2.ps.gz

A. Hacker, Xbox 360 hypervisor privilege escalation vulnerability, p.461489

J. D. Horton, R. Cooper, W. Hyslop, B. G. Nickerson, O. Ward et al., The Cascade Vulnerability Problem, Journal of Computer Security, vol.2, issue.4, pp.279-290, 1993.
DOI : 10.3233/JCS-1993-2402

M. Li, Y. Zhang, K. Bai, W. Zang, M. Yu et al., Improving cloud survivability through dependency based virtual machine placement, 2012.

H. Maziku and S. Shetty, Network Aware VM Migration in Cloud Data Centers, 2014 Third GENI Research and Educational Experiment Workshop, pp.25-28, 2014.
DOI : 10.1109/GREE.2014.18

D. H. Phan, J. Suzuki, R. Carroll, S. Balasubramaniam, W. Donnelly et al., Evolutionary multiobjective optimization for green clouds, Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference companion, GECCO Companion '12, pp.19-2612, 2012.
DOI : 10.1145/2330784.2330788

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009.
DOI : 10.1145/1653662.1653687

J. Rutkowska and R. Wojtczuk, Xen owning trilogy, Talk at Black Hat, 2008.

S. Shetty, X. Yuchi, and M. Song, Security-Aware Virtual Machine Placement in Cloud Data Center, Moving Target Defense for Distributed Systems, pp.13-24, 2016.
DOI : 10.1007/978-3-319-31032-9_2

S. Shigeta, H. Yamashima, T. Doi, T. Kawai, and K. Fukui, Design and implementation of a multiobjective optimization mechanism for virtual machine placement in cloud computing data center, International Conference on Cloud Computing, pp.21-31, 2012.

V. Varadarajan, Y. Zhang, T. Ristenpart, and M. M. Swift, A placement vulnerability study in multitenant public clouds, pp.913-928, 2015.

J. Xu and J. A. Fortes, Multi-Objective Virtual Machine Placement in Virtualized Data Center Environments, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, pp.179-188, 2010.
DOI : 10.1109/GreenCom-CPSCom.2010.137

Y. Xu, W. Cui, and M. Peinado, Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, 2015 IEEE Symposium on Security and Privacy, pp.2015-640, 2015.
DOI : 10.1109/SP.2015.45

Z. Xu, H. Wang, and Z. Wu, A measurement study on co-residence threat inside the cloud, 24th USENIX Security Symposium (USENIX Security 15). pp. 929?944. USENIX Association, 2015.

S. Yu, X. Gui, F. Tian, P. Yang, and J. Zhao, A Security-Awareness Virtual Machine Placement Scheme in the Cloud, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pp.1078-1083, 2013.
DOI : 10.1109/HPCC.and.EUC.2013.152

X. Yuchi and S. Shetty, Enabling security-aware virtual machine placement in iaas clouds, MIL- COM 2015 -2015 IEEE Military Communications Conference, pp.1554-1559, 2015.

W. Zhang, X. Jia, C. Wang, S. Zhang, Q. Huang et al., A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds, Information and Communications Security, pp.361-375, 2016.
DOI : 10.1145/2664168.2664179

Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, Cross-Tenant Side-Channel Attacks in PaaS Clouds, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.990-1003, 2014.
DOI : 10.1007/s00145-009-9049-y

Y. Zhang, M. Li, K. Bai, M. Yu, and W. Zang, Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds, pp.388-399, 2012.
DOI : 10.1007/978-3-642-30436-1_32

URL : https://hal.archives-ouvertes.fr/hal-01518239