| L01: Overview | 6.191 [6.004] slides: | | |
| L02: Side Channel Overview | | | |
| L03: Deep Dive of Cache Side Channels | | | |
| L04: Transient Execution Side Channels | | | |
| L05: Software-Hardware Contract | | | |
| L06: Side-channel Mitigations (by Yuheng Yang) | | | |
| L07: Physical Attacks (by Joseph Ravichandran) | | | |
| L08: Hardware Security Module (HSM) | | | |
| L09: Rowhammer Attacks | | | |
| L10: Rowhammer Mitigation + Reliability Solutions (by Peter Deutsch) | | | |
| L11: Hardware Support for Software Security | | | |
| L12: Fuzzing and Bug Finding | | | |
| L13: Formal Verification for Hardware Security | | | |
| L14: Trusted Execution Environment (TEE) | | | |