Our Story

Secure Hardware Design was created by Mengjia Yan with the mission to teach the next generation of computer architects how to design great processors.

Here’s a look back at how we’ve been thinking, playing, and doing for the past few years.

Fall 2020

We launched SHD as a seminar course during the pandemic.

Lecture Six lectures focused on side channels and Trusted Execution Environments (TEEs).
Lab Students completed a cache attack lab and an open-ended final project. One of the projects led to the publication of the Bigger Fish paper.
Paper Discussion The first offering of the course focused on teaching students read research papers, and thus was heavy on paper discussions.

Spring 2022

Driven by the great passion of Joseph Ravichandran, significant updates have been implemented in this iteration, making it a popular and lab-rich course. The status of the course was captured in a SigArch Blog post.

Lecture Eleven lectures covering a wider range of topics including side channel attacks, physical attacks, Rowhammer, and CPU fuzzing.
Recitation We introduced hands-on hacking recitations this year, running four capture-the-flag (CTF) sessions. We gave out several FTDI UART adapters and microcontrollers as prizes, and ran two pizza parties.
Lab We had a full-fledge hardware security lab suits, consisting of five exciting lab assignments on hacking real processors, including the new kernel Spectre attack lab, website fingerprinting lab, Rowhammer lab, and ASLR bypass lab. One of these labs inspired the discovery of the EntryBleed attack (HASP’23 Best Paper Award).
Paper Discussion The discussion sessions were streamlined with each one strategically scheduled after the corresponding lecture to reinforce the foundational knowledge covered. For a detailed schedule, please refer to the calendar.

Spring 2023

We stablized course content and polished the lab organziations. Meanwhile, we started receiving multiple requests around the world to use our course materials.

Lecture We introduced multiple in-class demos.
Recitation Two new recitation sessions are introduced: one on RISCV system programming and the other on formal evaluation of Register Transfer Level (RTL) code.
Lab We introduced a new capstone design project where students design end-to-end fuzzers on a custom RISCV chip for detecting hidden instructions.
Paper Discussion We further reduced the number of paper discussion sessions to emphasize its supplementary role.

Spring 2024 (Coming Soon!)

SHD is listed as a TQE course at MIT starting from this offering. We’re constantly working diligently to make Secure Hardware Design better than ever. Here’s where we’re going with it for next year and beyond.

Lecture We plan to add 2-3 new lectures on the topics of Physically Unclonable Function (PUF) and formal verification for hardware security.
Recitation More pizza parties.
Lab A new lab assignment will be added to guide the students to use the Yosys-Rosette toolchain to detect hardware bugs. We anticipate the difficulty level of the new lab will be ‘‘easy’’. Furthermore, we will reduce the difficulty level of the Rowhammer lab.
Paper Discussion As the course grows, we may plan to remove paper discussion sessions given that the scheduling for each student to give a presentation becomes less feasible. In Spring 2024, only graduate students (registering under 6.5950) will be asked to lead a paper discussion.

Acknowledgements

This course stands as an outcome of the combined efforts of many passionate students.

  • Joseph crafted three of the six lab assignments that have challenged and intrigued our students, from the kernel Spectre attack lab to the ASLR bypassing lab and the ingenious hardware fuzzing lab. He also designed a lecture on physical attacks that featured three captivating in-person attack demonstrations. Moreover, Joseph created all the eye-catching flyers and advertisement materials.
  • Peter and Miguel designed the Rowhammer lab, challenging students to delve deep into the intricate world of hardware vulnerabilities.
  • Yuheng took the lead in designing the hardware formal verification recitation session. Building on that success, Yuheng is now expanding it into a full-fledged lab.
  • Jack designed the website fingerprinting lab. This lab serves as a delightful warm-up for the course, and it imparts a thought-provoking lesson about the challenges of uncovering the root causes of side channels within complex systems.
  • Our very first TA, Miles, added the CTF component to the cache lab.