1 - 5 - week1_05 Sequential System Specification.srt
1 - 6 - week1_06 Sequential System Implementation.mp4
2 - 1 - week2_01 Introduction to IP Protection (11_'26__).mp4
2 - 4 - week2_04 Good Watermarks (15_'13__).srt
2 - 6 - week2_06 Hardware Metering (13_'24__).mp4
3 - 1 - week3_01 Physical Attacks (PA) Basics (14_'32__).mp4
3 - 6 - week3_06 ME Implementation and Vulnerability (14_'25__).srt
4 - 1 - week4_01 Introduction to Side Channel Attacks (14_'03__).mp4
4 - 2 - week4_02 Memory Vulnerabilities and Cache Attacks (19_'45__).mp4
4 - 4 - week4_04 More Attacks and Countermeasures (13_'02__).mp4
5 - 1 - week5_01 Hardware Trojan (HT) and Trusted IC (17_'52__).mp4
5 - 1 - week5_01 Hardware Trojan (HT) and Trusted IC (17_'52__).srt
5 - 2 - week5_02 Hardware Trojan Taxonomy (16_'01__).srt
5 - 5 - week5_05 Trusted IC Design with HT Prevention (17_'06__).mp4
6 - 3 - week6_06 Role of Hardware in Security and Trust (5_'34__).srt
6 - 4 - week6_02 Physical Unclonable Functions (PUF) Basics (16_'23__).srt
6 - 5 - week6_03 RO PUF_ Reliability (8_'06__).mp4
week4_03.pdf
week5_02.pdf
week6_06.pdf