A security-aware scheduler for virtual machines on iaas clouds, Report, 2011. ,
Security-Aware Resource Allocation in Clouds, 2013 IEEE International Conference on Services Computing, pp.400-407, 2013. ,
DOI : 10.1109/SCC.2013.36
Optimizing data access latencies in cloud systems by intelligent virtual machine placement, 2013 Proceedings IEEE INFOCOM, pp.647-655, 2013. ,
DOI : 10.1109/INFCOM.2013.6566850
Xen and the art of virtualization, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.164-177, 2003. ,
DOI : 10.1145/1165389.945462
Guaranteeing High Availability Goals for Virtual Machine Placement, 2011 31st International Conference on Distributed Computing Systems, pp.700-709, 2011. ,
DOI : 10.1109/ICDCS.2011.72
Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement Algorithms, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.125-131, 2013. ,
DOI : 10.1109/CyberC.2013.28
URL : https://hal.archives-ouvertes.fr/hal-00932401
A fast and elitist multiobjective genetic algorithm: NSGA-II, ) 11. default, M.: Kernel based virtual machine, pp.182-197, 2002. ,
DOI : 10.1109/4235.996017
URL : http://work.caltech.edu/amrit/papers/nsga2.ps.gz
Xbox 360 hypervisor privilege escalation vulnerability, p.461489 ,
The Cascade Vulnerability Problem, Journal of Computer Security, vol.2, issue.4, pp.279-290, 1993. ,
DOI : 10.3233/JCS-1993-2402
Improving cloud survivability through dependency based virtual machine placement, 2012. ,
Network Aware VM Migration in Cloud Data Centers, 2014 Third GENI Research and Educational Experiment Workshop, pp.25-28, 2014. ,
DOI : 10.1109/GREE.2014.18
Evolutionary multiobjective optimization for green clouds, Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference companion, GECCO Companion '12, pp.19-2612, 2012. ,
DOI : 10.1145/2330784.2330788
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212, 2009. ,
DOI : 10.1145/1653662.1653687
Xen owning trilogy, Talk at Black Hat, 2008. ,
Security-Aware Virtual Machine Placement in Cloud Data Center, Moving Target Defense for Distributed Systems, pp.13-24, 2016. ,
DOI : 10.1007/978-3-319-31032-9_2
Design and implementation of a multiobjective optimization mechanism for virtual machine placement in cloud computing data center, International Conference on Cloud Computing, pp.21-31, 2012. ,
A placement vulnerability study in multitenant public clouds, pp.913-928, 2015. ,
Multi-Objective Virtual Machine Placement in Virtualized Data Center Environments, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, pp.179-188, 2010. ,
DOI : 10.1109/GreenCom-CPSCom.2010.137
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, 2015 IEEE Symposium on Security and Privacy, pp.2015-640, 2015. ,
DOI : 10.1109/SP.2015.45
A measurement study on co-residence threat inside the cloud, 24th USENIX Security Symposium (USENIX Security 15). pp. 929?944. USENIX Association, 2015. ,
A Security-Awareness Virtual Machine Placement Scheme in the Cloud, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pp.1078-1083, 2013. ,
DOI : 10.1109/HPCC.and.EUC.2013.152
Enabling security-aware virtual machine placement in iaas clouds, MIL- COM 2015 -2015 IEEE Military Communications Conference, pp.1554-1559, 2015. ,
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds, Information and Communications Security, pp.361-375, 2016. ,
DOI : 10.1145/2664168.2664179
Cross-Tenant Side-Channel Attacks in PaaS Clouds, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.990-1003, 2014. ,
DOI : 10.1007/s00145-009-9049-y
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds, pp.388-399, 2012. ,
DOI : 10.1007/978-3-642-30436-1_32
URL : https://hal.archives-ouvertes.fr/hal-01518239