L01: Overview | 6.191 [6.004] slides: | | |
L02: Side Channel Overview | | | |
L03: Deep Dive of Cache Side Channels | | | |
L04: Transient Execution Side Channels | | | |
L05: Software-Hardware Contract | | | |
L06: Side-channel Mitigations (by Yuheng Yang) | | | |
L07: Physical Attacks (by Joseph Ravichandran) | | | |
L08: Hardware Security Module (HSM) | | | |
L09: Rowhammer Attacks | | | |
L10: Rowhammer Mitigation + Reliability Solutions (by Peter Deutsch) | | | |
L11: Hardware Support for Software Security | | | |
L12: Fuzzing and Bug Finding | | | |
L13: Formal Verification for Hardware Security | | | |
L14: Trusted Execution Environment (TEE) | | | |