{"id":3964,"date":"2023-01-07T18:26:50","date_gmt":"2023-01-07T18:26:50","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3964"},"modified":"2023-09-29T13:33:59","modified_gmt":"2023-09-29T13:33:59","slug":"hsl","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/","title":{"rendered":"Hardware Security Lab (HSL)"},"content":{"rendered":"\n<div class=\"wp-block-group has-alt-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained has-light-background\"><div class=\"wp-block-group__inner-container\"><div class=\"mai-columns has-xl-margin-top has-xl-margin-bottom\"><div class=\"mai-columns-wrap has-columns\" style=\"--column-gap:var(--spacing-xl);--row-gap:var(--spacing-xl);--align-columns:start;--align-columns-vertical:initial;\">\n<div class=\"mai-column is-column\" style=\"--flex-xs:0 0 100%;--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/2;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/4;--flex-lg:0 0 var(--flex-basis);--justify-content:start;\">\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-31034-8\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.springernature.com\/full\/springer-static\/cover-hires\/book\/978-3-031-31034-8?as=webp\" alt=\"\" width=\"207\" height=\"321\"><\/a><\/figure><\/div>\n\n<div class=\"mai-column is-column\" style=\"--flex-xs:0 0 100%;--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/2;--flex-md:0 0 var(--flex-basis);--columns-lg:3\/4;--flex-lg:0 0 var(--flex-basis);--justify-content:start;\">\n\n<p>The pages listed below consist of labs that you can follow along as you read each chapter within the book <strong>Hardware Security Training, Hands-on! <\/strong><\/p>\n\n\n\n<p>Each module include a Readme file, module description, and source code.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"is-style-subheading\"><a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-31034-8\" target=\"_blank\">FIND THE BOOK ON SPRINGER LINK!<\/a><\/p>\n\n<\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-layout-3 wp-block-group-is-layout-flex has-sm-padding-left has-sm-padding-right\"><span class=\"mai-icon mai-icon-info-circle\" style=\"display:block;text-align:center;--icon-margin:0px 0px 0px 0px;--icon-padding:15px;--icon-size:40px;--icon-color:var(--color-white);--icon-background:#1ced8a;--icon-border-radius:var(--border-radius);\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" width=\"40\" height=\"40\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-36 344h12V232h-12c-6.627 0-12-5.373-12-12v-8c0-6.627 5.373-12 12-12h48c6.627 0 12 5.373 12 12v140h12c6.627 0 12 5.373 12 12v8c0 6.627-5.373 12-12 12h-72c-6.627 0-12-5.373-12-12v-8c0-6.627 5.373-12 12-12zm36-240c-17.673 0-32 14.327-32 32s14.327 32 32 32 32-14.327 32-32-14.327-32-32-32z\"><\/path><\/svg><\/span><\/span>\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained has-sm-padding-top has-sm-padding-bottom has-sm-padding-left has-sm-padding-right has-lg-margin-top\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading has-body-color has-text-color has-md-font-size\">Please use the following to cite in your publications if any of the following modules and information are used.<\/h3>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>M. Tehranipoor, N. Anandakumar, and F. Farahmandi, <a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-31034-8\" target=\"_blank\"><strong>Hardware Security Training, Hands-on!<\/strong><\/a>, Springer, 2023.<\/p>\n<\/blockquote>\n<\/div><\/div>\n\n\n<\/div>\n\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading is-style-subheading has-body-color has-text-color has-md-font-size\">Labs<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide has-lg-margin-top has-lg-margin-bottom\">\n\n\n<div class=\"mai-grid entries entries-grid has-image-background\" style=\"--entry-title-font-size:var(--font-size-sm);--aspect-ratio:4\/3;--align-text:start;--align-text-vertical:center;--border-radius:0px;--entry-meta-text-align:start;\"><div class=\"entries-wrap has-columns\" style=\"--columns-xs:1\/1;--columns-sm:1\/2;--columns-md:1\/4;--columns-lg:1\/4;--flex-xs:0 0 var(--flex-basis);--flex-sm:0 0 var(--flex-basis);--flex-md:0 0 var(--flex-basis);--flex-lg:0 0 var(--flex-basis);--column-gap:var(--spacing-lg);--row-gap:var(--spacing-lg);--align-columns:start;\"><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:1;\" aria-label=\"Chapter 1: PUF\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch1_puf\/\" aria-labelledby=\"entry-title-1\"><\/a><h3 class=\"entry-title\" id=\"entry-title-1\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch1_puf\/\" rel=\"bookmark\">Chapter 1: PUF<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:2;\" aria-label=\"Chapter 2: True Random Number Generator (TRNG)\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch2_trng\/\" aria-labelledby=\"entry-title-2\"><\/a><h3 class=\"entry-title\" id=\"entry-title-2\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch2_trng\/\" rel=\"bookmark\">Chapter 2: True Random Number Generator (TRNG)<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:3;\" aria-label=\"Chapter 3: Recycled IC Detection using Odometer\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch3_recycled_ic_odometer\/\" aria-labelledby=\"entry-title-3\"><\/a><h3 class=\"entry-title\" id=\"entry-title-3\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch3_recycled_ic_odometer\/\" rel=\"bookmark\">Chapter 3: Recycled IC Detection using Odometer<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:4;\" aria-label=\"Chapter 4: Recycled FPGA Detection\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch4_recycled_fpga\/\" aria-labelledby=\"entry-title-4\"><\/a><h3 class=\"entry-title\" id=\"entry-title-4\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch4_recycled_fpga\/\" rel=\"bookmark\">Chapter 4: Recycled FPGA Detection<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:5;\" aria-label=\"Chapter 5: Hardware Trojan Insertion\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch5_hw_trojan_insert\/\" aria-labelledby=\"entry-title-5\"><\/a><h3 class=\"entry-title\" id=\"entry-title-5\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch5_hw_trojan_insert\/\" rel=\"bookmark\">Chapter 5: Hardware Trojan Insertion<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:6;\" aria-label=\"Chapter 6: Hardware Trojan Detection\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch6_hw_trojan_detect\/\" aria-labelledby=\"entry-title-6\"><\/a><h3 class=\"entry-title\" id=\"entry-title-6\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch6_hw_trojan_detect\/\" rel=\"bookmark\">Chapter 6: Hardware Trojan Detection<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:7;\" aria-label=\"Chapter 7: Security Verification\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch7_security_verification\/\" aria-labelledby=\"entry-title-7\"><\/a><h3 class=\"entry-title\" id=\"entry-title-7\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch7_security_verification\/\" rel=\"bookmark\">Chapter 7: Security Verification<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:8;\" aria-label=\"Chapter 8: Power Side-Channel Analysis on AES\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch8_psc_on_aes\/\" aria-labelledby=\"entry-title-8\"><\/a><h3 class=\"entry-title\" id=\"entry-title-8\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch8_psc_on_aes\/\" rel=\"bookmark\">Chapter 8: Power Side-Channel Analysis on AES<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:9;\" aria-label=\"Chapter 9: EM-based Side Channel Analysis\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch9_em_sca\/\" aria-labelledby=\"entry-title-9\"><\/a><h3 class=\"entry-title\" id=\"entry-title-9\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch9_em_sca\/\" rel=\"bookmark\">Chapter 9: EM-based Side Channel Analysis<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:10;\" aria-label=\"Chapter 10: Logic Locking\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch10_logic_locking\/\" aria-labelledby=\"entry-title-10\"><\/a><h3 class=\"entry-title\" id=\"entry-title-10\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch10_logic_locking\/\" rel=\"bookmark\">Chapter 10: Logic Locking<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:11;\" aria-label=\"Chapter 11: Clock Glitch based Fault Injection Analysis\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch11_clock_glitch_fia\/\" aria-labelledby=\"entry-title-11\"><\/a><h3 class=\"entry-title\" id=\"entry-title-11\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch11_clock_glitch_fia\/\" rel=\"bookmark\">Chapter 11: Clock Glitch based Fault Injection Analysis<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:12;\" aria-label=\"Chapter 12: Voltage Glitch based Fault Injection Analysis\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch12_voltage_glitch_fia\/\" aria-labelledby=\"entry-title-12\"><\/a><h3 class=\"entry-title\" id=\"entry-title-12\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch12_voltage_glitch_fia\/\" rel=\"bookmark\">Chapter 12: Voltage Glitch based Fault Injection Analysis<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:13;\" aria-label=\"Chapter 13: Laser based Fault Injection Analysis\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch13_laser_fia\/\" aria-labelledby=\"entry-title-13\"><\/a><h3 class=\"entry-title\" id=\"entry-title-13\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch13_laser_fia\/\" rel=\"bookmark\">Chapter 13: Laser based Fault Injection Analysis<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:14;\" aria-label=\"Chapter 14: Laser Probing on Logic Locking\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch14_probing_on_logic_locking\/\" aria-labelledby=\"entry-title-14\"><\/a><h3 class=\"entry-title\" id=\"entry-title-14\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch14_probing_on_logic_locking\/\" rel=\"bookmark\">Chapter 14: Laser Probing on Logic Locking<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:15;\" aria-label=\"Chapter 15: Universal Fault Sensor\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch15_universal_fault_sensor\/\" aria-labelledby=\"entry-title-15\"><\/a><h3 class=\"entry-title\" id=\"entry-title-15\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch15_universal_fault_sensor\/\" rel=\"bookmark\">Chapter 15: Universal Fault Sensor<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:16;\" aria-label=\"Chapter 16: Scanning Electron Microscope\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"300\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg\" class=\"entry-image size-landscape-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-400x300.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-800x600.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/Circuit-Board-e1516651896666-1200x900.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 399.5px, (min-width:800px) and (max-width: 999px) 249.75px, (min-width:1000px) 300px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch16_sem\/\" aria-labelledby=\"entry-title-16\"><\/a><h3 class=\"entry-title\" id=\"entry-title-16\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch16_sem\/\" rel=\"bookmark\">Chapter 16: Scanning Electron Microscope<\/a><\/h3>\n<\/div><\/article><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Please use the following to cite in your publications if any of the following modules and information are used. M. Tehranipoor, N. Anandakumar, and F. Farahmandi, Hardware Security Training, Hands-on!, Springer, 2023. Labs<\/p>\n","protected":false},"author":6,"featured_media":2565,"parent":3958,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3964"}],"version-history":[{"count":32,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964\/revisions"}],"predecessor-version":[{"id":5270,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964\/revisions\/5270"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3958"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}