- Microarchitectural Side-Channels (2 weeks)
- Cache side-channels
- Transient Execution Attacks
- Covert Channels
- Brief Introduction into Cryptography (0.5 week)
- Physical Side-Channels (1.5 weeks)
- Power and electromagnetic side-channels
- Fault attacks (PMU, rowhammer)
- Unconventional methods
- Trusted Execution Units (1 week)
- Attestation, TPM, and secure boot
- SGX and Trustzone (attacks, defenses, and use-cases)
- Open-Source Enclaves
- Hardware Security (1.5 weeks)
- Hardware Trojans
- Anti-Tamper systems and obfuscation
- IP and supply-chain trust
- PUFs and RNGs
- Machine Learning Security and Privacy (2.5 weeks)
- Security in ML (attacks and defenses)
- Privacy in ML (attacks)
- Privacy-Preserving Computation
- Memory Safety and Security (1 weeks)
- Attacks (buffer-overflow, ROP, jump-oriented)
- Hardware-Support for memory security
- Program analysis tools and methodologies