{"id":591,"date":"2021-09-09T15:32:47","date_gmt":"2021-09-09T15:32:47","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=591"},"modified":"2023-05-09T00:35:49","modified_gmt":"2023-05-09T00:35:49","slug":"program","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2022\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\"><nav class=\"is-responsive items-justified-center wp-block-navigation is-content-justification-center is-layout-flex wp-container-core-navigation-layout-1 wp-block-navigation-is-layout-flex\" aria-label=\"AICAD4Sec Workshop 2025\" \n\t\t\tdata-wp-interactive\n\t\t\tdata-wp-context='{\"core\":{\"navigation\":{\"overlayOpenedBy\":[],\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}}}'\n\t\t><button aria-haspopup=\"true\" aria-label=\"Open menu\" class=\"wp-block-navigation__responsive-container-open \" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.openMenuOnClick\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t<div class=\"wp-block-navigation__responsive-container  \" style=\"\" id=\"modal-1\" \n\t\t\tdata-wp-class--has-modal-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-class--is-menu-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.initMenu\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t\tdata-wp-on--focusout=\"actions.core.navigation.handleMenuFocusout\"\n\t\t\ttabindex=\"-1\"\n\t\t>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\tdata-wp-bind--aria-modal=\"selectors.core.navigation.ariaModal\"\n\t\t\tdata-wp-bind--aria-label=\"selectors.core.navigation.ariaLabel\"\n\t\t\tdata-wp-bind--role=\"selectors.core.navigation.roleAttribute\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.focusFirstElement\"\n\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Close menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.closeMenuOnClick\"\n\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" id=\"modal-1-content\">\n\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container is-responsive items-justified-center wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/\"><span class=\"wp-block-navigation-item__label\">Home<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/oc_workshop_2025\/\"><span class=\"wp-block-navigation-item__label\">Workshop Organizers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/speakers_25\/\"><span class=\"wp-block-navigation-item__label\">Speakers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/program\/\"><span class=\"wp-block-navigation-item__label\">Program<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/nav><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"style-675 style-local-591-c1 position-relative\" data-colibri-id=\"591-c1\">\n<div id=\"custom\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-680 style-local-591-c2 position-relative\" data-colibri-component=\"section\" data-colibri-id=\"591-c2\">\n<div class=\"h-section-grid-container h-section-boxed-container\">\n<div class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-681 style-local-591-c3 position-relative\" data-colibri-id=\"591-c3\">\n<div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n<div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-682-outer style-local-591-c4-outer\">\n<div class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-682 style-local-591-c4 position-relative\" data-colibri-id=\"591-c4\">\n<div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n<div class=\"h-global-transition-all h-heading style-683 style-local-591-c5 position-relative h-element\" data-colibri-id=\"591-c5\">\n<div class=\"h-heading__outer style-683 style-local-591-c5\">&nbsp;<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"reusable-sections\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-687 style-local-591-c6 position-relative\" data-colibri-component=\"section\" data-colibri-id=\"591-c6\">\n<div class=\"h-section-grid-container h-section-boxed-container\">\n<div class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-688 style-local-591-c7 position-relative\" data-colibri-id=\"591-c7\">\n<div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n<div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-1501-outer style-local-591-c24-outer\">\n<div class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-1501 style-local-591-c24 position-relative\" data-colibri-id=\"591-c24\">\n<div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n<div class=\"h-x-container style-1502 style-local-591-c25 position-relative h-element\" data-colibri-id=\"591-c25\">\n<div class=\"h-x-container-inner style-dynamic-591-c25-group style-1502-spacing style-local-591-c25-spacing\"><span style=\"font-size: revert; color: var(--body-color,var(--color-body)); font-family: var(--body-font-family,unset); font-style: var(--body-font-style,normal); font-weight: var(--body-font-weight,unset);\">\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\">\n<thead>\n<tr class=\"row-1 odd\">\n\t<th class=\"column-1\"><strong>Time <\/strong><\/th><th class=\"column-2\"><strong>Event<\/strong><\/th><th class=\"column-3\"><strong>Speakers\/Panelists<\/strong><\/th><th class=\"column-4\"><strong>Slides<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\">08:20 - 08:30<br \/>\n<\/td><td class=\"column-2\">Welcoming Remarks<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><b> Mark Tehranipoor <\/b> \u2013 <em>University of Florida<\/em><br \/>\n<br \/>\n<\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/0820_0830_Agenda_Mark_Tehranipoor.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\">08:30 - 09:00<\/td><td class=\"column-2\">Keynote Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Jay Lewis <\/b>  \u2013 <em>Microsoft<\/em><br \/>\nTitle: <em>Cloud &amp; AI Technologies for Faster, Secure Semiconductor Supply Chains<\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/0830_0900_Keynote_Jay_Lewis.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\">09:00 - 09:20<\/td><td class=\"column-2\">Invited Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Nicole Fern <\/b> \u2013 <em> Riscure<\/em><br \/>\nTitle: <em> Hardware Shift-Left: Pre-silicon Fault Injection Evaluation and Power Side Channel Testing <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/0900_0920_Talk_Nicole_Fern.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\">09:20 - 09:40<\/td><td class=\"column-2\">Invited Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Dan Walters <\/b> \u2013 <em> Mitre <\/em><br \/>\nTitle: <em> Secure by Construction; Automating the verification and implementation of security features <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/0920_0940_Talk_Dan_Walters.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\">09:40 - 10:00<\/td><td class=\"column-2\">Visionary Talk<\/td><td class=\"column-3\">Speaker: <b> Norman Chang <\/b> \u2013 <em>Ansys<\/em><br \/>\nTitle: <em> Multiphysics Simulation of EM and Thermal Side-Channels with ML-based Auto-POI Identification <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/0940_1000_Talk_Norman_Chang.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\">10:00 - 10:30<\/td><td class=\"column-2\">Coffee Break<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\">10:30 - 10:50<\/td><td class=\"column-2\">Invited Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Jeremy Bellay <\/b> - <em> Battlle <\/em><br \/>\nTitle: <em> Composable Security: Towards Security from Silicon to Software and Systems <\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\">10:50 - 11:10 <\/td><td class=\"column-2\">Invited Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Beau Bakken <\/b> \u2013 <em> Caspia Technologies <\/em><br \/>\nTitle: <em> SoC Security: Making a Case for Automation <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/1050_1110_Talk_Beau_Bakken.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\">11:10 - 11:30 <\/td><td class=\"column-2\">Invited Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Ujjwal Guin <\/b> \u2013 <em> Auburn University <\/em><br \/>\nTitle: <em> SAT Attack Complexity Analysis <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/1110_1130_Talk_Ujjwal_Guin.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\">11:30 - 13:00 <\/td><td class=\"column-2\">Lunch Break<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\">13:00 - 13:20 <\/td><td class=\"column-2\">Invited Talk<\/td><td class=\"column-3\">Speaker: <b> Jason Oberg <\/b> \u2013 <em>Cycurity<\/em><br \/>\nTitle: <em> Establishing a Comprehensive Security Verification Program <\/em><br \/>\n<br \/>\n<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\">13:20 - 13:40 <\/td><td class=\"column-2\">Invited Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Dan Benua <\/b> \u2013 <em>Cadence<\/em><br \/>\nTitle: <em> The Role of Formal Verification in Quantifiable Hardware Security Assurance <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/1320_1340_Talk_Dan_Benua.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\">13:40 - 14:00 <br \/>\n<\/td><td class=\"column-2\">Invited Talk<br \/>\n<br \/>\n<\/td><td class=\"column-3\">Speaker: <b> Hadi M Kamali <\/b> \u2013 <em>University of Florida<\/em><br \/>\nTitle: <em> Security of Hardware Generators: Secure from Construction <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/1340_1400_Talk_Hadi_M_Kamali.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\">14:00 - 14:30 <\/td><td class=\"column-2\">Coffee Break<br \/>\n<\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\">14:30 - 15:30 <\/td><td class=\"column-2\">Panel Discussion<br \/>\n<br \/>\nModerator: <br \/>\n<b> Farimah Farahmandi <\/b><br \/>\n<em> University of Florida <\/em><\/td><td class=\"column-3\">Panelists:<br \/>\n- <b> Saverio Fazzari <\/b> \u2013 <em> Booz Allen Hamilton <\/em><br \/>\n- <b> Sidney Allman <\/b> \u2013 <em> Marvell Technology <\/em><br \/>\n- <b> Sohrab Aftabjahani <\/b> \u2013 <em> Intel Corporation <\/em><br \/>\n- <b> Adam Cron <\/b> \u2013 <em> Synopsys <\/em><br \/>\n- <b> John Goodenough <\/b> \u2013 <em> (Former ARM) <\/em><br \/>\n- <b> Adam Kimura <\/b> \u2013 <em> Battelle <\/em><br \/>\n<br \/>\nTitle: <em> Secure Silicon Development Lifecycle: Challenges &amp; Solutions <\/em><\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/1430_1530_Panel_Sid_Allman.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><br \/>\n<a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/1430_1530_Panel_Sohrab_Aftabjahani.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\">15:30 - 16:30<\/td><td class=\"column-2\">CAD Tool Demo<br \/>\n<\/td><td class=\"column-3\">By Students<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-18 even\">\n\t<td class=\"column-1\">16:30 - 16:55<\/td><td class=\"column-2\">Closing Thoughts by an industry of leader<\/td><td class=\"column-3\">Speaker: <b> Mike Borza <\/b> \u2013 <em>Synopsys<\/em><br \/>\n<br \/>\n<\/td><td class=\"column-4\"><a class=\"mai-icon mai-icon-file-pdf\" style=\"display:block;text-align:left;--icon-margin:0px 0px 0px 0px;--icon-padding:0px;--icon-size:1.5em;--icon-color:currentColor;--icon-border-radius:var(--border-radius);\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/2022_CAD4sec\/1630_1655_Closing_Mike_Borza.pdf\" target=\"_blank\" rel=\"noopener nofollow\"><span class=\"mai-icon-wrap\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 384 512\" width=\"240\" height=\"240\"><!-- Font Awesome Pro 5.15.4 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license (Commercial License) --><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zm-22.6 22.7c2.1 2.1 3.5 4.6 4.2 7.4H256V32.5c2.8.7 5.3 2.1 7.4 4.2l83.9 83.9zM336 480H48c-8.8 0-16-7.2-16-16V48c0-8.8 7.2-16 16-16h176v104c0 13.3 10.7 24 24 24h104v304c0 8.8-7.2 16-16 16zm-22-171.2c-13.5-13.3-55-9.2-73.7-6.7-21.2-12.8-35.2-30.4-45.1-56.6 4.3-18 12-47.2 6.4-64.9-4.4-28.1-39.7-24.7-44.6-6.8-5 18.3-.3 44.4 8.4 77.8-11.9 28.4-29.7 66.9-42.1 88.6-20.8 10.7-54.1 29.3-58.8 52.4-3.5 16.8 22.9 39.4 53.1 6.4 9.1-9.9 19.3-24.8 31.3-45.5 26.7-8.8 56.1-19.8 82-24 21.9 12 47.6 19.9 64.6 19.9 27.7.1 28.9-30.2 18.5-40.6zm-229.2 89c5.9-15.9 28.6-34.4 35.5-40.8-22.1 35.3-35.5 41.5-35.5 40.8zM180 175.5c8.7 0 7.8 37.5 2.1 47.6-5.2-16.3-5-47.6-2.1-47.6zm-28.4 159.3c11.3-19.8 21-43.2 28.8-63.7 9.7 17.7 22.1 31.7 35.1 41.5-24.3 4.7-45.4 15.1-63.9 22.2zm153.4-5.9s-5.8 7-43.5-9.1c41-3 47.7 6.4 43.5 9.1z\"><\/path><\/svg><\/span><\/a><\/td>\n<\/tr>\n<tr class=\"row-19 odd\">\n\t<td class=\"column-1\">16:55 - 17:00<\/td><td class=\"column-2\">Closing remarks<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><b> Farimah Farahmandi <\/b> \u2013 <em>University of Florida<\/em><br \/>\n<br \/>\n<\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-2 from cache --><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2245,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/591"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=591"}],"version-history":[{"count":28,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/591\/revisions"}],"predecessor-version":[{"id":4412,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/591\/revisions\/4412"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/2245"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}