| Background Reviews and Related Books | Research Papers (mentioned in class) | Fun Readings and Videos |
| L01: Overview | 6.191 [6.004] slides: | | |
| L02: Side Channel Overview | | | |
| L03: Deep Dive of Cache Side Channels | | | |
| L04: Transient Execution Side Channels | | | |
| L05: Hardware-Software Contracts | | | |
| L06: Side-channel Mitigations | | | |
| L07: Hardware Security Module (HSM) | | | |
| L08: Physical Attacks (by Joseph Ravichandran) | | | |
| L09: Rowhammer Attacks | | | |
| L10: Rowhammer Mitigation + Reliability Solutions | | | |
| L11: Hardware Support for Software Security | | | |
| L12: Fuzzing and Bug Finding | | | |
| L13: Formal Verification for Hardware Security | | | |
| L14: Trusted Execution Environment (TEE) | | | |