{"id":570,"date":"2021-09-09T15:25:59","date_gmt":"2021-09-09T15:25:59","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=570"},"modified":"2023-09-25T15:55:12","modified_gmt":"2023-09-25T15:55:12","slug":"cad-tools","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/","title":{"rendered":"CAD Tools"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-white-color has-header-background-color has-text-color has-background is-layout-flow wp-block-group-is-layout-flow has-dark-background has-lg-padding-top has-lg-padding-bottom has-xxl-margin-bottom\"><div class=\"wp-block-group__inner-container\"><div class=\"mai-columns\"><div class=\"mai-columns-wrap has-columns\" style=\"--column-gap:var(--spacing-xl);--row-gap:var(--spacing-xl);--align-columns:start;--align-columns-vertical:initial;\">\n<div class=\"mai-column is-column\" style=\"--flex-xs:0 0 100%;--flex-sm:0 0 100%;--columns-md:1\/2;--flex-md:0 0 var(--flex-basis);--columns-lg:2\/3;--flex-lg:0 0 var(--flex-basis);--justify-content:start;\">\n\n<h2 class=\"wp-block-heading\">A hardware assurance <a href=\"http:\/\/cad4security.org\/wp-content\/uploads\/HW_assure_survey_2021.pdf\" data-type=\"URL\" data-id=\"http:\/\/cad4security.org\/wp-content\/uploads\/HW_assure_survey_2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">survey<\/a> was done in 2021, demonstrating the priority of actions on Hardware-oriented topics.<\/h2>\n\n<\/div>\n\n<div class=\"mai-column is-column\" style=\"--columns-xs:1\/2;--flex-xs:0 0 var(--flex-basis);--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/4;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/3;--flex-lg:0 0 var(--flex-basis);--justify-content:start;\">\n<span class=\"mai-icon mai-icon-envelope\" style=\"display:block;text-align:left;--icon-margin:0px 0px 5px 0px;--icon-padding:0px;--icon-size:40px;--icon-color:currentColor;--icon-border-radius:50%;\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\" width=\"40\" height=\"40\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M464 64H48C21.5 64 0 85.5 0 112v288c0 26.5 21.5 48 48 48h416c26.5 0 48-21.5 48-48V112c0-26.5-21.5-48-48-48zM48 96h416c8.8 0 16 7.2 16 16v41.4c-21.9 18.5-53.2 44-150.6 121.3-16.9 13.4-50.2 45.7-73.4 45.3-23.2.4-56.6-31.9-73.4-45.3C85.2 197.4 53.9 171.9 32 153.4V112c0-8.8 7.2-16 16-16zm416 320H48c-8.8 0-16-7.2-16-16V195c22.8 18.7 58.8 47.6 130.7 104.7 20.5 16.4 56.7 52.5 93.3 52.3 36.4.3 72.3-35.5 93.3-52.3 71.9-57.1 107.9-86 130.7-104.7v205c0 8.8-7.2 16-16 16z\"><\/path><\/svg><\/span><\/span>\n\n\n<p>Interested in helping us expand this list via your own tools? <a href=\"http:\/\/cad4security.org\/index.php\/contact-us\/\" data-type=\"URL\" data-id=\"http:\/\/cad4security.org\/index.php\/contact-us\/\">Contact Us<\/a><\/p>\n\n<\/div>\n<\/div><\/div>\n\n\n<hr class=\"wp-block-separator has-text-color has-body-color has-css-opacity has-body-background-color has-background is-style-wide has-xxl-margin-top has-xxl-margin-bottom\"><div class=\"mai-columns\"><div class=\"mai-columns-wrap has-columns\" style=\"--column-gap:var(--spacing-xl);--row-gap:var(--spacing-xl);--align-columns:start;--align-columns-vertical:initial;\">\n<div class=\"mai-column is-column\" style=\"--columns-xs:1\/2;--flex-xs:0 0 var(--flex-basis);--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/4;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/4;--flex-lg:0 0 var(--flex-basis);\">\n<span class=\"mai-icon mai-icon-building\" style=\"display:block;text-align:left;--icon-margin:0px 0px 24px 0px;--icon-padding:0px;--icon-size:50px;--icon-color:currentColor;--icon-border-radius:50%;\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\" width=\"50\" height=\"50\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M192 107v40c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12v-40c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12zm116-12h-40c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zm-128 96h-40c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zm128 0h-40c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zm-128 96h-40c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zm128 0h-40c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zm140 205v20H0v-20c0-6.627 5.373-12 12-12h20V24C32 10.745 42.745 0 56 0h336c13.255 0 24 10.745 24 24v456h20c6.627 0 12 5.373 12 12zm-64-12V32H64v448h128v-85c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v85h128z\"><\/path><\/svg><\/span><\/span>\n\n\n<h3 class=\"wp-block-heading\">50<\/h3>\n\n\n\n<p>Industry &#038; Defense Organizations<\/p>\n\n<\/div>\n\n<div class=\"mai-column is-column\" style=\"--columns-xs:1\/2;--flex-xs:0 0 var(--flex-basis);--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/4;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/4;--flex-lg:0 0 var(--flex-basis);--justify-content:start;\">\n<span class=\"mai-icon mai-icon-landmark\" style=\"display:block;text-align:left;--icon-margin:0px 0px 24px 0px;--icon-padding:0px;--icon-size:50px;--icon-color:currentColor;--icon-border-radius:50%;\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 576 512\" width=\"50\" height=\"50\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M565.62 92.11L299.24 2.04C295.62.68 291.81 0 288 0s-7.62.68-11.24 2.04L10.38 92.11A16.001 16.001 0 0 0 0 107.09V144c0 8.84 7.16 16 16 16h544c8.84 0 16-7.16 16-16v-36.91c0-6.67-4.14-12.64-10.38-14.98zM544 128H32v-9.42L288 32l256 86.56V128zm24 352h-24v-64c0-17.67-16.37-32-36.57-32H496V192h-32v192h-96V192h-32v192h-96V192h-32v192h-96V192H80v192H68.57C48.37 384 32 398.33 32 416v64H8c-4.42 0-8 3.58-8 8v16c0 4.42 3.58 8 8 8h560c4.42 0 8-3.58 8-8v-16c0-4.42-3.58-8-8-8zm-56 0H64v-62.72c.7-.52 2.21-1.28 4.57-1.28h438.86c2.37 0 3.87.76 4.57 1.28V480z\"><\/path><\/svg><\/span><\/span>\n\n\n<h3 class=\"wp-block-heading\">9<\/h3>\n\n\n\n<p>Government Agencies<\/p>\n\n<\/div>\n\n<div class=\"mai-column is-column\" style=\"--columns-xs:1\/2;--flex-xs:0 0 var(--flex-basis);--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/4;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/4;--flex-lg:0 0 var(--flex-basis);--justify-content:start;\">\n<span class=\"mai-icon mai-icon-chalkboard-teacher\" style=\"display:block;text-align:left;--icon-margin:0px 0px 24px 0px;--icon-padding:0px;--icon-size:50px;--icon-color:currentColor;--icon-border-radius:50%;\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 640 512\" width=\"50\" height=\"50\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M608 0H192c-17.67 0-32 14.33-32 32v96c-53.02 0-96 42.98-96 96s42.98 96 96 96 96-42.98 96-96c0-41.74-26.8-76.9-64-90.12V32h416v352h-64v-64c0-17.67-14.33-32-32-32H384c-17.67 0-32 14.33-32 32v64h-46.66c-.59-.94-1.03-1.96-1.65-2.88-17.25-25.62-46.67-39.11-76.9-39.11C199 342.02 192.02 352 160 352c-31.97 0-38.95-9.98-66.79-9.98-30.23 0-59.65 13.48-76.9 39.11C6.01 396.42 0 414.84 0 434.67V472c0 22.09 17.91 40 40 40h240c22.09 0 40-17.91 40-40v-37.33c0-6.41-.84-12.6-2.04-18.67H608c17.67 0 32-14.33 32-32V32c0-17.67-14.33-32-32-32zM224 224c0 35.29-28.71 64-64 64s-64-28.71-64-64 28.71-64 64-64 64 28.71 64 64zm64 248c0 4.41-3.59 8-8 8H40c-4.41 0-8-3.59-8-8v-37.33c0-12.79 3.75-25.13 10.85-35.67 10.53-15.64 29.35-24.98 50.36-24.98 21.8 0 29.99 9.98 66.79 9.98 36.79 0 45.01-9.98 66.79-9.98 21 0 39.83 9.34 50.36 24.98 7.1 10.54 10.85 22.88 10.85 35.67V472zm224-88H384v-64h128v64z\"><\/path><\/svg><\/span><\/span>\n\n\n<h3 class=\"wp-block-heading\">117<\/h3>\n\n\n\n<p>Academic Institutions<\/p>\n\n<\/div>\n\n<div class=\"mai-column is-column\" style=\"--columns-xs:1\/2;--flex-xs:0 0 var(--flex-basis);--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/4;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/4;--flex-lg:0 0 var(--flex-basis);--justify-content:start;\">\n<span class=\"mai-icon mai-icon-exclamation\" style=\"display:block;text-align:left;--icon-margin:0px 0px 24px 0px;--icon-padding:0px;--icon-size:50px;--icon-color:currentColor;--icon-border-radius:50%;\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 192 512\" width=\"50\" height=\"50\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M139.315 32c6.889 0 12.364 5.787 11.982 12.666l-14.667 264c-.353 6.359-5.613 11.334-11.982 11.334H67.352c-6.369 0-11.628-4.975-11.982-11.334l-14.667-264C40.321 37.787 45.796 32 52.685 32h86.63M96 352c35.29 0 64 28.71 64 64s-28.71 64-64 64-64-28.71-64-64 28.71-64 64-64M139.315 0h-86.63C27.457 0 7.353 21.246 8.753 46.441l14.667 264c.652 11.728 5.864 22.178 13.854 29.665C14.613 357.682 0 385.168 0 416c0 52.935 43.065 96 96 96s96-43.065 96-96c0-30.832-14.613-58.318-37.274-75.894 7.991-7.487 13.203-17.937 13.854-29.665l14.667-264C184.647 21.251 164.548 0 139.315 0z\"><\/path><\/svg><\/span><\/span>\n\n\n<h4 class=\"wp-block-heading\">This demonstrates the importance of expanding CAD tools for security.<\/h4>\n\n<\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n\n\n<div class=\"mai-grid entries entries-grid has-image-background\" style=\"--entry-title-font-size:var(--font-size-lg);--aspect-ratio:1\/1;--align-text:center;--align-text-vertical:center;--border-radius:0px;--entry-meta-text-align:center;\"><div class=\"entries-wrap has-columns\" style=\"--columns-xs:1\/1;--columns-sm:1\/1;--columns-md:1\/3;--columns-lg:1\/3;--flex-xs:0 0 var(--flex-basis);--flex-sm:0 0 var(--flex-basis);--flex-md:0 0 var(--flex-basis);--flex-lg:0 0 var(--flex-basis);--column-gap:var(--spacing-lg);--row-gap:var(--spacing-lg);--align-columns:start;\"><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:1;\" aria-label=\"Side Channel Analysis\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/side-channel-400x400.jpeg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/side-channel-80x80.jpeg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/side-channel-150x150.jpeg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/side-channel-400x400.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/side-channel-800x800.jpeg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/side-channel-1200x1200.jpeg 1200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/side-channel-analysis\/\" aria-labelledby=\"entry-title-1\"><\/a><h3 class=\"entry-title\" id=\"entry-title-1\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/side-channel-analysis\/\" rel=\"bookmark\">Side Channel Analysis<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:2;\" aria-label=\"Fault Injection Analysis\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"334\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/fault-injection-400x334.jpeg\" class=\"entry-image size-square-sm\" alt=\"\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/\" aria-labelledby=\"entry-title-2\"><\/a><h3 class=\"entry-title\" id=\"entry-title-2\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/fault-injection-analysis\/\" rel=\"bookmark\">Fault Injection Analysis<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:3;\" aria-label=\"Reverse Engineering\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/reverse-engineering-400x400.png\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/reverse-engineering-80x80.png 80w, http:\/\/cad4security.org\/wp-content\/uploads\/reverse-engineering-150x150.png 150w, http:\/\/cad4security.org\/wp-content\/uploads\/reverse-engineering-400x400.png 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/reverse-engineering\/\" aria-labelledby=\"entry-title-3\"><\/a><h3 class=\"entry-title\" id=\"entry-title-3\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/reverse-engineering\/\" rel=\"bookmark\">Reverse Engineering<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:4;\" aria-label=\"Automation of Hardware Security\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/automation-of-hardware-security\/\" aria-labelledby=\"entry-title-4\"><\/a><h3 class=\"entry-title\" id=\"entry-title-4\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/automation-of-hardware-security\/\" rel=\"bookmark\">Automation of Hardware Security<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:5;\" aria-label=\"IP Protection\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/ip-protection-400x400.jpeg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/ip-protection-80x80.jpeg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/ip-protection-150x150.jpeg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/ip-protection-400x400.jpeg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/ip-protection\/\" aria-labelledby=\"entry-title-5\"><\/a><h3 class=\"entry-title\" id=\"entry-title-5\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/ip-protection\/\" rel=\"bookmark\">IP Protection<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:6;\" aria-label=\"PUF Security Analysis\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"371\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/puf-security-400x371.jpeg\" class=\"entry-image size-square-sm\" alt=\"\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/puf-security-analysis\/\" aria-labelledby=\"entry-title-6\"><\/a><h3 class=\"entry-title\" id=\"entry-title-6\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/puf-security-analysis\/\" rel=\"bookmark\">PUF Security Analysis<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:7;\" aria-label=\"PCB Security Verification\ufffc\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"314\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/pcb-security-400x314.jpeg\" class=\"entry-image size-square-sm\" alt=\"\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/pcb-security-verification\/\" aria-labelledby=\"entry-title-7\"><\/a><h3 class=\"entry-title\" id=\"entry-title-7\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/pcb-security-verification\/\" rel=\"bookmark\">PCB Security Verification\ufffc<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:8;\" aria-label=\"Hardware Trojan\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/hardware-trojan-400x400.jpeg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/hardware-trojan-80x80.jpeg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/hardware-trojan-150x150.jpeg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/hardware-trojan-400x400.jpeg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/hardware-trojan-600x600.jpeg 600w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/hardware-trojan\/\" aria-labelledby=\"entry-title-8\"><\/a><h3 class=\"entry-title\" id=\"entry-title-8\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/cad-tools\/hardware-trojan\/\" rel=\"bookmark\">Hardware Trojan<\/a><\/h3>\n<\/div><\/article><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/570"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=570"}],"version-history":[{"count":26,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/570\/revisions"}],"predecessor-version":[{"id":5166,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/570\/revisions\/5166"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}