Hardware Security Courses
Stanford University via YouTube Hardware Security Following CHIPS Act Enactment - New Era for Supply Chain
RSA Conference via YouTube Scaling Software Supply Chain Source Security in Large Enterprises
RSA Conference via YouTube REGA - Scalable Rowhammer Mitigation with Refresh-Generating Activations
IEEE via YouTube A Security RISC - Microarchitectural Attacks on Hardware RISC-V CPUs
IEEE via YouTube Attacking an Open Source U2F Device in 30 Minutes or Less
media.ccc.de via YouTube New Tales of Wireless Input Devices
Cooper via YouTube Practical and Affordable Side-Channel Attacks
Cooper via YouTube Introducing Hardware-Level Device Isolation to Zephyr
Linux Foundation via YouTube Secure Boot - What Is It and Do I Need It?
Linux Foundation via YouTube