Hardware Security Courses
TheIACR via YouTube Key Extraction Using Thermal Laser Stimulation - A Case Study on Xilinx Ultrascale FPGAs
TheIACR via YouTube The First Thorough Side Channel Hardware Trojan
TheIACR via YouTube Run Time Accessible DRAM PUFs in Commodity Devices
TheIACR via YouTube IoT Defenses - Software, Hardware, Wireless, and Cloud
YouTube Identifying and Exploiting Hardware Vulnerabilities - Demo of the HRES Process
YouTube Crash the IoT Train Yourself - Intentionally Vulnerable WRT IV WRT
YouTube Hardware Tamper Resistance - Why and How
YouTube Cluck Cluck on Intel's Broken Promises - BSidesLV 2014
YouTube Jtagulator - Assisted Discovery of On-Chip Debug Interfaces
YouTube