Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Reading List

* Indicates the resource is available through MIT library.

Background Reviews and Related Books Research Papers Fun Readings and Videos

L01 Intro

6.191 [6.004] slides

L02 Side Channel

L03 Cache-based Side Channels

L04 Transient Execution Attacks

L05 Software and Hardware Contract

L06 Hardware Security Module

L07 Physical Attacks

L08 Rowhammer Attacks

L09 Trusted Execution Environment (TEE)

L10 Hardware Support for Memory Safety

L11 Hardware Fuzzing and Verification