par exemple les cartes vidéos sur des architectures très spécifiques peuvent effectuer ces accès pair-à-pair pour mettre en oeuvre du calcul distribué. [1] National Institute of Standards and Technology (NIST), " The NIST Definition of Cloud Computing, 2011. ,
Formal requirements for virtualizable third generation architectures, Communications of the ACM, vol.17, issue.7, pp.412-421, 1974. ,
DOI : 10.1145/361011.361073
Understanding Full Virtualization, Paravirtualization, and Hardware Assist http://www.vmware.com/resources/techresources, 1008. ,
Tcvisor : A hypervisor level secure storage, Internet Technology and Secured Transactions (ICITST), 2010 International Conference for, pp.1-9, 2010. ,
http://www.intel.com/content/www/us/en/pci-express/ pci-sig-sr-iov-primer-sr-iov-technology-paper.html, pp.2011-2023 ,
(Cité en page 14.) [14] VMware VMware workstation, pp.2016-2030, 2016. ,
A hardware-assisted virtualization based approach on how to protect the kernel space from malicious actions, Proceedings of the 18th Annual Conference of the European Institute for Computer Antivirus Research (EICAR), 2009. ,
sduverger/ramooflax, a pre-boot virtualization tool ,
VMware ESXi https://www.vmware.com/fr/products/esxi-and-esx/ overview ,
Eliminating the hypervisor attack surface for a more secure cloud, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.401-412 ,
DOI : 10.1145/2046707.2046754
Guide de la sûreté de fonctionnement, Toulouse : Cépaduès, 1995. ,
Basic concepts and taxonomy of dependable and secure computing, IEEE transactions on dependable and secure computing, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.5446
Malicious-and accidental-fault tolerance for internet applications-conceptual model and architecture, 2001. ,
Using cpu system management mode to circumvent operating system security functions, 2006. ,
Quelques éléments en matière de sécurité des cartes réseau, Actes du 8ème symposium sur la sécurité des technologies de l'information et des communications, pp.2010-2028 ,
Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.110-121, 1991. ,
DOI : 10.1109/RISP.1991.130780
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9968
When virtual is harder than real : Security challenges in virtual machine based computing environments, Proceedings of the 10th Conference on Hot Topics in Operating Systems, pp.20-20, 2005. ,
CloudVisor, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.203-216 ,
DOI : 10.1145/2043556.2043576
Survey of Security Problems in Cloud Computing Virtual Machines Cloud and security :threat or opportunity, Computer and Electronics Security Applications Rendez-vous, pp.61-74, 2012. ,
Attacks on more virtual machine emulators, Symantec Technology Exchange, vol.55, 2007. ,
Subverting the xen hypervisor, Black Hat USA, pp.25-26, 2008. ,
Cloudburst : A vmware guest to host escape story ,
Virtunoid : Breaking out of kvm, pp.25-26 ,
Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.199-212 ,
DOI : 10.1145/1653662.1653687
Secure virtualization and multicore platforms state-ofthe-art report, tech. rep, 2009. ,
Secvisor : A tiny hypervisor to provide lifetime kernel code integrity for commodity oses, ACM SIGOPS Operating Systems Review, pp.335-350, 2007. ,
Towards integrity measurement in virtualized environments — A hypervisor based sensory integrity measurement architecture (SIMA), 2010 IEEE International Conference on Technologies for Homeland Security (HST), pp.106-112 ,
DOI : 10.1109/THS.2010.5655084
HIMA: A Hypervisor-Based Integrity Measurement Agent, 2009 Annual Computer Security Applications Conference, pp.461-470, 2009. ,
DOI : 10.1109/ACSAC.2009.50
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.5721
Une approche de virtualisation assistée par le matériel pour protéger l'espace noyau d'actions malveillantes, Actes du 7ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.321-346, 2009. ,
Sécurité des noyaux de systèmes d'exploitation, 2009. ,
System monitoring and controlling mechanism based on hypervisor, Parallel and Distributed Processing with Applications IEEE International Symposium on, pp.549-554, 2009. ,
Hypervisor support for identifying covertly executing binaries, USENIX Security Symposium, pp.243-258, 2008. ,
Unified extensible firmware interface specification ,
A Two-Step Execution Mechanism for Thin Secure Hypervisors, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.129-135, 2009. ,
DOI : 10.1109/SECURWARE.2009.27
Xen security modules (xsm), Xen Summit, 2006. ,
HyperSentry, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.38-49 ,
DOI : 10.1145/1866307.1866313
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, pp.380-395 ,
DOI : 10.1109/SP.2010.30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.7292
Tinychecker : Transparent protection of vms against hypervisor failures with nested virtualization, Dependable Systems and Networks Workshops 2012 IEEE/IFIP 42nd International Conference on, pp.1-6 ,
Xen 0wning trilogy, Black Hat conference, 2008. ,
CloudVisor, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.203-216 ,
DOI : 10.1145/2043556.2043576
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers, 2008 IEEE Asia-Pacific Services Computing Conference, pp.1225-1230, 2008. ,
DOI : 10.1109/APSCC.2008.14
VIPER, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.3-16, 2011. ,
DOI : 10.1145/2046707.2046711
IOCheck: A framework to enhance the security of I/O devices at runtime, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pp.1-4 ,
DOI : 10.1109/DSNW.2013.6615523
Trustzone : Integrated hardware and software security, ARM white paper, vol.3, issue.4, pp.18-24, 2004. ,
Innovative technology for cpu based attestation and sealing, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, pp.10-2013 ,
Copilot-a coprocessor-based kernel runtime integrity monitor, USENIX Security Symposium, pp.179-194, 2004. ,
ACPI et routine de traitement de la SMI, Actes du 7ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.132-168, 2009. ,
Ironhide : plate-forme d'attaques par entrées-sorties, Actes du 10ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.237-265 ,
Tpm specification version 1.2 : Design principles, pp.2011-2052 ,
Pioneer, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.1-16 ,
DOI : 10.1145/1095809.1095812
SWATT: software-based attestation for embedded devices, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.272-282, 2004. ,
DOI : 10.1109/SECPRI.2004.1301329
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.194
Smart : Secure and minimal architecture for (establishing dynamic) root of trust, NDSS, pp.1-15 ,
A performance-driven SoC architecture for video synthesis. Skolan för informatons-och kommunikationsteknik, Kungliga Tekniska högskolan, 2010. ,
LogiCORE TM IP Virtex R -6 FPGA Integrated Block for PCI Express R, 2011. ,
Milkymist, an open hardware video synthesis platform, 26th Chaos Communication Congress, 2009. ,
Rtems real time operating system (rtos) ,
milkymist-linux. " https://github.com/m-labs/ linux-milkymist ,
Ironhide : plate-forme d'attaques par entrées-sorties, Actes du 10ème symposium sur la sécurité des technologies de l'information et des communications (SSTIC), pp.237-265 ,
Lex : A lexical analyzer generator, 1975. ,
The turtles project : Design and implementation of nested virtualization, OSDI, pp.423-436, 2010. ,
Abyme : un voyage au coeur des hyperviseurs récursifs, Symposium sur la Sécurité des Technologies de l'Information et des Communications, pp.2015-97 ,
Caractérisation et contrôle de l'intégrité d'un hyperviseur de sécurité, p.2016 ,
Bypassing IOMMU Protection against I/O Attacks, 2016 Seventh Latin-American Symposium on Dependable Computing (LADC), p.114 ,
DOI : 10.1109/LADC.2016.31
URL : https://hal.archives-ouvertes.fr/hal-01419962