{"id":3980,"date":"2023-01-07T18:52:03","date_gmt":"2023-01-07T18:52:03","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3980"},"modified":"2023-07-10T14:28:13","modified_gmt":"2023-07-10T14:28:13","slug":"ch16_sem","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch16_sem\/","title":{"rendered":"Chapter 16: Scanning Electron Microscope"},"content":{"rendered":"\n<h2 class=\"is-style-subheading wp-block-heading\"><strong>Chapter 16<\/strong><\/h2>\n\n\n\n<h2 class=\"is-style-subheading wp-block-heading\" style=\"font-style:normal;font-weight:100\">Scanning Electron Microscope Training<\/h2>\n\n\n\n<p>The scanning electron microscope (SEM) is a microscope that uses electrons instead of light to form an image. The learning objective of this chapter is for readers to gain a comprehensive understanding of performing high-quality SEM imaging. The purpose of this chapter is for readers to understand how to operate a scanning electron microscope and then how to use electron imaging in a variety of security and trust related applications. In addition, we demonstrate how to detect malicious modifications by an untrusted foundry inside an IC using SEM images. After successfully completing this experiment, readers will understand hardware Trojans and detecting them using various SEM imaging methods and comprehend the sample preparation process.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/Chapter16_Scanning-Electron-Microscope-Training.zip\">download chapter files<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Chapter 16 Scanning Electron Microscope Training The scanning electron microscope (SEM) is a microscope that uses electrons instead of light to form an image. The learning objective of this chapter is for readers to gain a comprehensive understanding of performing high-quality SEM imaging. The purpose of this chapter is for readers to understand how to &hellip;<\/p>\n","protected":false},"author":6,"featured_media":2565,"parent":3964,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3980"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3980"}],"version-history":[{"count":4,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3980\/revisions"}],"predecessor-version":[{"id":4629,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3980\/revisions\/4629"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}