S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li et al., DKSM: Subverting Virtual Machine Introspection for Fun and Profit, 2010 29th IEEE Symposium on Reliable Distributed Systems, pp.82-91, 2010.
DOI : 10.1109/SRDS.2010.39

URL : http://www.csc.ncsu.edu/faculty/jiang/pubs/SRDS10.pdf

D. Birk and C. Wegener, Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp.1-10, 2011.
DOI : 10.1109/SADFE.2011.17

J. Dykstra and A. T. Sherman, Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques, Digital Investigation, vol.9, pp.90-98, 2012.
DOI : 10.1016/j.diin.2012.05.001

J. Dykstra and A. T. Sherman, Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform, Digital Investigation, vol.10, pp.87-95, 2013.
DOI : 10.1016/j.diin.2013.06.010

S. Garfinkel, Network forensics: Tapping the internet Available at http://www.oreillynet.com, 2002.

T. Gebhardt and H. P. Reiser, Network Forensics for Cloud Computing, In: DAIS, pp.29-42, 2013.
DOI : 10.1007/978-3-642-38541-4_3

URL : https://hal.archives-ouvertes.fr/hal-01489462

B. Martini and K. R. Choo, An integrated conceptual digital forensic framework for cloud computing, Digital Investigation, vol.9, issue.2, pp.71-80, 2012.
DOI : 10.1016/j.diin.2012.07.001

R. Paleari, L. Martignoni, G. F. Roglia, and D. Bruschi, A fistful of red-pills: How to automatically generate procedures to detect cpu emulators, Proceedings of the 3rd USENIX Conference on Offensive Technologies. WOOT'09, 2009.

F. Rocha, S. Abreu, and M. Correia, The Final Frontier: Confidentiality and Privacy in the Cloud, Computer, vol.44, issue.9, pp.44-50, 2011.
DOI : 10.1109/MC.2011.223

C. Schneider, J. Pfoh, and C. Eckert, A Universal Semantic Bridge for Virtual Machine Introspection, Proceedings of the 7th International Conference on Information Systems Security. ICISS'11, pp.370-373, 2011.
DOI : 10.1145/1653662.1653728

A. Shamir and N. V. Someren, Playing ???Hide and Seek??? with Stored Keys, Proceedings of the Third International Conference on Financial Cryptography. FC '99, pp.118-124, 1999.
DOI : 10.1007/3-540-48390-X_9

URL : http://www.ncipher.com/products/files/papers/anguilla/keyhide2.pdf

M. Taylor, J. Haggerty, D. Gresty, and D. Lamb, Forensic investigation of cloud computing systems, Network Security, vol.2011, issue.3, pp.2011-2014, 2011.
DOI : 10.1016/S1353-4858(11)70024-1