|  Background Reviews and Related Books |  Research Papers (mentioned in class) |  Fun Readings and Videos |  
  | L01: Overview |   6.191 [6.004] slides:   |    |     |  
  | L02: Side Channel Overview |    |     |     |  
  | L03: Deep Dive of Cache Side Channels |    |     |     |  
  | L04: Transient Execution Side Channels |     |     |    |  
  | L05: Hardware-Software Contracts |    |     |    |  
  | L06: Side-channel Mitigations |    |     |    |  
  | L07: Hardware Security Module (HSM) |     |     |    |  
  | L08: Physical Attacks (by Joseph Ravichandran) |     |     |     |  
  | L09: Rowhammer Attacks |     |     |     |  
  | L10: Rowhammer Mitigation + Reliability Solutions |    |     |    |  
  | L11: Hardware Support for Software Security |     |     |     |  
  | L12: Fuzzing and Bug Finding |    |     |     |  
  | L13: Formal Verification for Hardware Security |    |     |    |  
  | L14: Trusted Execution Environment (TEE) |     |     |    |