April 2nd, 2025

MIT 6.5950 Secure Hardware Design – An open-source course on hardware attacks

MIT's Secure Hardware Design course teaches hardware security through hands-on experience, including lectures, interactive recitations, and labs, focusing on real attacks and defenses, with open-source materials for educators.

Read original articleLink Icon
MIT 6.5950 Secure Hardware Design – An open-source course on hardware attacks

MIT's Secure Hardware Design course (6.5950/6.5951) is an open-source program focused on teaching students about hardware security, including how to attack modern CPUs and design resilient architectures. The course emphasizes hands-on experience, allowing students to engage in real-world hacking of processors while learning about various hardware attacks and defenses. The curriculum is structured around three main pillars: Think, Play, and Do. In the "Think" component, students critically analyze hardware security through lectures covering topics like microarchitectural attacks, side channels, and physical security. The "Play" aspect involves interactive recitations where students participate in Capture-the-Flag (CTF) competitions to apply their knowledge in a collaborative environment. Finally, the "Do" segment consists of labs where students implement attacks on actual hardware, ensuring practical application of theoretical concepts. The course materials are continuously updated to reflect the latest research in hardware security and are available for other educators to use, provided they attribute the source.

- MIT's Secure Hardware Design course teaches hardware security through hands-on experience.

- The curriculum includes lectures, interactive recitations, and practical labs.

- Students learn to implement real attacks on CPUs and design defenses against them.

- The course materials are open-source and can be used by other educators with proper attribution.

- The program emphasizes critical thinking and collaboration among students.

Link Icon 7 comments
By @klop1 - 1 day
I actually did these a while ago. Courses taught me a lot and have recommended it to friends since. Very grateful for the course team for making everything public :)
By @ignoramous - 1 day
If you're looking for a quick overview, Satnam Singh who worked at Google on Silver Oak / OpenTitan, gave an interesting 50m talk related to his work: https://youtube.com/watch?v=ujmgPCIWuU4 / mirror: https://ghostarchive.org/varchive/ujmgPCIWuU4 [summary: https://g.co/gemini/share/07c6439e8a78 / mirror: https://archive.vn/51k4y]

OpenTitan (RISC-V based tamper-resistant open specification RoT/TPM/SE) themselves have a neat write-up on designing against hardware attacks: https://opentitan.org/book/doc/security/implementation_guide... / mirror: https://archive.vn/UqAVo

By @oytis - 1 day
Somewhat unrelated, but - is it just me or do other people notice too, that whenever a major university publishes course materials online, the instructors there are normally very young? It wasn't like that a while ago, e.g. when Coursera started, or it is not like that if you look at older MIT videos.

Does it reflect university teachers getting younger? Or younger teachers tend to give more effort to putting everything online? Or did my perception change with age?

By @mettamage - 1 day
Reminds me of hardware security at VUSEC Amsterdam :)

Good times!

By @brcmthrowaway - 2 days
Does this include Spectre?