Hardware Vulnerabilities Courses
Black Hat via YouTube Exploiting Modern Microarchitectures - Meltdown, Spectre, & Other Hardware Attacks
Stanford University via YouTube Spectre and Meltdown vs. Real-Time - Measuring Mitigation Costs
Linux Foundation via YouTube Exploiting Hardware Glitches and Side Channels in Perfect Software
OWASP Foundation via YouTube Leaky Processors - Stealing Your Secrets With Foreshadow
OWASP Foundation via YouTube The Kernel Report
linux.conf.au via YouTube Microarchitectural Leakage Modeling
TheIACR via YouTube Can We Solve Timing Side-Channels in the CPU - TASER 2021
TheIACR via YouTube Reversing Robots and Bypassing Security: Hacking Vacuum and Lawn Robots
media.ccc.de via YouTube From Phantom to Inception: Leaking Data Using Branch-Free Predictor Training
OffensiveCon via YouTube