. Sauf-cas-particulier, par exemple les cartes vidéos sur des architectures très spécifiques peuvent effectuer ces accès pair-à-pair pour mettre en oeuvre du calcul distribué. [1] National Institute of Standards and Technology (NIST), " The NIST Definition of Cloud Computing, 2011.

G. J. Popek and R. P. Goldberg, Formal requirements for virtualizable third generation architectures, Communications of the ACM, vol.17, issue.7, pp.412-421, 1974.
DOI : 10.1145/361011.361073

. Vmware, Understanding Full Virtualization, Paravirtualization, and Hardware Assist http://www.vmware.com/resources/techresources, 1008.

M. Rezaei, N. Moosavi, H. Nemati, and R. Azmi, Tcvisor : A hypervisor level secure storage, Internet Technology and Secured Transactions (ICITST), 2010 International Conference for, pp.1-9, 2010.

R. Intel, ". Lan-access-division, and . Primer, http://www.intel.com/content/www/us/en/pci-express/ pci-sig-sr-iov-primer-sr-iov-technology-paper.html, pp.2011-2023

. Oracle and . Virtualbox, (Cité en page 14.) [14] VMware VMware workstation, pp.2016-2030, 2016.

E. Lacombe, V. Nicomette, and Y. Deswarte, A hardware-assisted virtualization based approach on how to protect the kernel space from malicious actions, Proceedings of the 18th Annual Conference of the European Institute for Computer Antivirus Research (EICAR), 2009.

S. Duverger, sduverger/ramooflax, a pre-boot virtualization tool

. Vmware, VMware ESXi https://www.vmware.com/fr/products/esxi-and-esx/ overview

J. Szefer, E. Keller, R. B. Lee, and J. Rexford, Eliminating the hypervisor attack surface for a more secure cloud, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.401-412
DOI : 10.1145/2046707.2046754

J. Laprie, J. Arlat, J. Blanquart, A. Costes, Y. Crouzet et al., Guide de la sûreté de fonctionnement, Toulouse : Cépaduès, 1995.

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE transactions on dependable and secure computing, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.5446

D. Powell and R. Stroud, Malicious-and accidental-fault tolerance for internet applications-conceptual model and architecture, 2001.

L. Duflot, D. Etiemble, and O. Grumelard, Using cpu system management mode to circumvent operating system security functions, 2006.

Y. Perez, L. Duflot, O. Levillain, and G. Valadon, Quelques éléments en matière de sécurité des cartes réseau, Actes du 8ème symposium sur la sécurité des technologies de l'information et des communications, pp.2010-2028

Y. Deswarte, L. Blain, and J. C. Fabre, Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.110-121, 1991.
DOI : 10.1109/RISP.1991.130780

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9968

T. Garfinkel and M. Rosenblum, When virtual is harder than real : Security challenges in virtual machine based computing environments, Proceedings of the 10th Conference on Hot Topics in Operating Systems, pp.20-20, 2005.

F. Zhang, J. Chen, H. Chen, and B. Zang, CloudVisor, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.203-216
DOI : 10.1145/2043556.2043576

I. Studnia, E. Alata, Y. Deswarte, M. Kaâniche, and V. Nicomette, Survey of Security Problems in Cloud Computing Virtual Machines Cloud and security :threat or opportunity, Computer and Electronics Security Applications Rendez-vous, pp.61-74, 2012.

P. Ferrie, Attacks on more virtual machine emulators, Symantec Technology Exchange, vol.55, 2007.

R. Wojtczuk, Subverting the xen hypervisor, Black Hat USA, pp.25-26, 2008.

K. Kortchinsky, Cloudburst : A vmware guest to host escape story

N. Elhage, Virtunoid : Breaking out of kvm, pp.25-26

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212
DOI : 10.1145/1653662.1653687

H. Douglas and C. Gehrmann, Secure virtualization and multicore platforms state-ofthe-art report, tech. rep, 2009.

A. Seshadri, M. Luk, N. Qu, and A. Perrig, Secvisor : A tiny hypervisor to provide lifetime kernel code integrity for commodity oses, ACM SIGOPS Operating Systems Review, pp.335-350, 2007.

B. Stelte, R. Koch, and M. Ullmann, Towards integrity measurement in virtualized environments — A hypervisor based sensory integrity measurement architecture (SIMA), 2010 IEEE International Conference on Technologies for Homeland Security (HST), pp.106-112
DOI : 10.1109/THS.2010.5655084

A. Azab, P. Ning, E. Sezer, and X. Zhang, HIMA: A Hypervisor-Based Integrity Measurement Agent, 2009 Annual Computer Security Applications Conference, pp.461-470, 2009.
DOI : 10.1109/ACSAC.2009.50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.5721

É. Lacombe, V. Nicomette, and Y. Deswarte, Une approche de virtualisation assistée par le matériel pour protéger l'espace noyau d'actions malveillantes, Actes du 7ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.321-346, 2009.

E. Lacombe, Sécurité des noyaux de systèmes d'exploitation, 2009.

W. Qingbo, W. Chunguang, and T. Yusong, System monitoring and controlling mechanism based on hypervisor, Parallel and Distributed Processing with Applications IEEE International Symposium on, pp.549-554, 2009.

L. Litty, H. A. Lagar-cavilla, and D. Lie, Hypervisor support for identifying covertly executing binaries, USENIX Security Symposium, pp.243-258, 2008.

I. Unified and E. , Unified extensible firmware interface specification

M. Hirano, T. Shinagawa, H. Eiraku, S. Hasegawa, K. Omote et al., A Two-Step Execution Mechanism for Thin Secure Hypervisors, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.129-135, 2009.
DOI : 10.1109/SECURWARE.2009.27

G. Coker, Xen security modules (xsm), Xen Summit, 2006.

A. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang et al., HyperSentry, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.38-49
DOI : 10.1145/1866307.1866313

Z. Wang and X. Jiang, HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, pp.380-395
DOI : 10.1109/SP.2010.30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.7292

C. Tan, Y. Xia, H. Chen, and B. Zang, Tinychecker : Transparent protection of vms against hypervisor failures with nested virtualization, Dependable Systems and Networks Workshops 2012 IEEE/IFIP 42nd International Conference on, pp.1-6

R. Wojtczuk, J. Rutkowska, and A. Tereshkin, Xen 0wning trilogy, Black Hat conference, 2008.

F. Zhang, J. Chen, H. Chen, and B. Zang, CloudVisor, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.203-216
DOI : 10.1145/2043556.2043576

M. Hirano, T. Shinagawa, H. Eiraku, S. Hasegawa, K. Omote et al., Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers, 2008 IEEE Asia-Pacific Services Computing Conference, pp.1225-1230, 2008.
DOI : 10.1109/APSCC.2008.14

Y. Li, J. M. Mccune, and A. Perrig, VIPER, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.3-16, 2011.
DOI : 10.1145/2046707.2046711

F. Zhang, IOCheck: A framework to enhance the security of I/O devices at runtime, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pp.1-4
DOI : 10.1109/DSNW.2013.6615523

T. Alves and D. Felton, Trustzone : Integrated hardware and software security, ARM white paper, vol.3, issue.4, pp.18-24, 2004.

I. Anati, S. Gueron, S. Johnson, and V. Scarlata, Innovative technology for cpu based attestation and sealing, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, pp.10-2013

N. L. Petroni-jr, T. Fraser, J. Molina, and W. A. Arbaugh, Copilot-a coprocessor-based kernel runtime integrity monitor, USENIX Security Symposium, pp.179-194, 2004.

L. Duflot and O. Levillain, ACPI et routine de traitement de la SMI, Actes du 7ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.132-168, 2009.

F. L. Sang, V. Nicomette, and Y. Deswarte, Ironhide : plate-forme d'attaques par entrées-sorties, Actes du 10ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.237-265

C. Trusted and . Group, Tpm specification version 1.2 : Design principles, pp.2011-2052

A. Seshadri, M. Luk, E. Shi, A. Perrig, L. Van-doorn et al., Pioneer, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.1-16
DOI : 10.1145/1095809.1095812

A. Seshadri, A. Perrig, L. Van-doorn, and P. Khosla, SWATT: software-based attestation for embedded devices, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.272-282, 2004.
DOI : 10.1109/SECPRI.2004.1301329

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.194

K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito, Smart : Secure and minimal architecture for (establishing dynamic) root of trust, NDSS, pp.1-15

S. Bourdeauducq, A performance-driven SoC architecture for video synthesis. Skolan för informatons-och kommunikationsteknik, Kungliga Tekniska högskolan, 2010.

I. Xilinx, LogiCORE TM IP Virtex R -6 FPGA Integrated Block for PCI Express R, 2011.

S. Bourdeauducq, Milkymist, an open hardware video synthesis platform, 26th Chaos Communication Congress, 2009.

T. R. Project, Rtems real time operating system (rtos)

T. Matsuya and S. Bourdeauducq, milkymist-linux. " https://github.com/m-labs/ linux-milkymist

F. L. Sang, V. Nicomette, and Y. Deswartes, Ironhide : plate-forme d'attaques par entrées-sorties, Actes du 10ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.237-265

M. E. Lesk and E. Schmidt, Lex : A lexical analyzer generator, 1975.

M. Ben-yehuda, M. D. Day, Z. Dubitzky, M. Factor, N. Har-'el et al., The turtles project : Design and implementation of nested virtualization, OSDI, pp.423-436, 2010.

B. Morgan, É. Alata, V. Nicomette, and G. Averlant, Abyme : un voyage au coeur des hyperviseurs récursifs, Symposium sur la Sécurité des Technologies de l'Information et des Communications, pp.2015-97

J. Roux, Caractérisation et contrôle de l'intégrité d'un hyperviseur de sécurité, p.2016

B. Morgan, E. Alata, V. Nicomette, and M. Kaaniche, Bypassing IOMMU Protection against I/O Attacks, 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), p.114
DOI : 10.1109/LADC.2016.31

URL : https://hal.archives-ouvertes.fr/hal-01419962