{"id":1763,"date":"2022-03-24T17:50:36","date_gmt":"2022-03-24T17:50:36","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=1763"},"modified":"2022-12-18T18:14:14","modified_gmt":"2022-12-18T18:14:14","slug":"auto-3d-automated-reverse-engineering-of-printed-circuit-board-design","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/reverse-engineering\/auto-3d-automated-reverse-engineering-of-printed-circuit-board-design\/","title":{"rendered":"Auto-3D: Automated Reverse Engineering of Printed Circuit Board Design"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Tool Name<\/strong><\/h2>\n\n\n\n<p>Auto-3D: Automated Reverse Engineering of Printed Circuit Board Design<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CAD for<\/strong><\/h2>\n\n\n\n<p>Reverse Engineering of Printed Circuit Board<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>The verification of PCB design for failure analysis, proving evidence of IP theft by a competitor, and reverse engineering for product development or resurgence is a complex process requiring tools and experienced personnel. This process often requires time consuming destructive or expensive nondestructive tools for design derivation. X-ray volumetric analysis is used to collect 3D volume information from a PCB, and the Auto-3D system is capable of assisted and automated PCB netlist extraction. Auto-3D is developed upon open-source software capable of working with any X-ray tool equipped with adequate resolution and volumetric data collection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/localhost.cad4securitybk\/wp-content\/uploads\/2-xrayreconr.zip\" target=\"_blank\" rel=\"noreferrer noopener\">DOWNLOAD TOOL<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n\n\n\n<p><a href=\"mailto:nasadi@ece.ufl.edu\">Navid Asadi-Zanjani <\/a>| University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:tehranipoor@ece.ufl.edu\">Mark Tehranipoor<\/a> | University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:jtrue15@ufl.edu\">John True<\/a> |  University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:dhwanimehta@ufl.edu\">Dhwani Mehta<\/a> | University of Florida<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name Auto-3D: Automated Reverse Engineering of Printed Circuit Board Design CAD for Reverse Engineering of Printed Circuit Board Description The verification of PCB design for failure analysis, proving evidence of IP theft by a competitor, and reverse engineering for product development or resurgence is a complex process requiring tools and experienced personnel. This process &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1739,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1763"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=1763"}],"version-history":[{"count":5,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1763\/revisions"}],"predecessor-version":[{"id":3747,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1763\/revisions\/3747"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1739"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=1763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}