| Background Reviews and Related Books | Research Papers (mentioned in class) | Fun Readings and Videos |
L01: Overview | 6.191 [6.004] slides: | | |
L02: Side Channel Overview | | | |
L03: Deep Dive of Cache Side Channels | | | |
L04: Transient Execution Side Channels | | | |
L05: Hardware-Software Contracts | | | |
L06: Side-channel Mitigations | | | |
L07: Hardware Security Module (HSM) | | | |
L08: Physical Attacks (by Joseph Ravichandran) | | | |
L09: Rowhammer Attacks | | | |
L10: Rowhammer Mitigation + Reliability Solutions | | | |
L11: Hardware Support for Software Security | | | |
L12: Fuzzing and Bug Finding | | | |
L13: Formal Verification for Hardware Security | | | |
L14: Trusted Execution Environment (TEE) | | | |