Introductions
Cryptography
Supply Chain
Physical Attacks
Side-Channel/Microarchitecture/Transient Execution Attacks
Software/Hardware Contract
Rowhammer Attacks
Memory Safety
Hardware Security Modules/Enclaves
Hardware Fuzzing and Verification
Blogs, YouTube Channels, Books, Online Classes, etc
Apple