{"id":4811,"date":"2026-04-02T10:45:26","date_gmt":"2026-04-02T15:45:26","guid":{"rendered":"https:\/\/faculty.eng.ufl.edu\/swarup\/?page_id=4811"},"modified":"2026-04-02T10:54:14","modified_gmt":"2026-04-02T15:54:14","slug":"hardware-hacking-haha-board-for-security-training","status":"publish","type":"page","link":"https:\/\/faculty.eng.ufl.edu\/swarup\/hardware-hacking-haha-board-for-security-training\/","title":{"rendered":"HArdware HAcking (HAHA) Board for Security Training"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"1024\" src=\"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-content\/uploads\/sites\/689\/2026\/04\/HaHa_Board-870x1024-2.jpg\" alt=\"\" class=\"wp-image-4857\" srcset=\"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-content\/uploads\/sites\/689\/2026\/04\/HaHa_Board-870x1024-2.jpg 870w, https:\/\/faculty.eng.ufl.edu\/swarup\/wp-content\/uploads\/sites\/689\/2026\/04\/HaHa_Board-870x1024-2-255x300.jpg 255w, https:\/\/faculty.eng.ufl.edu\/swarup\/wp-content\/uploads\/sites\/689\/2026\/04\/HaHa_Board-870x1024-2-768x904.jpg 768w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><\/figure>\n\n\n\n<p><strong>Description:<\/strong><br>The HArdware HAcking boards are experimental development boards for teaching and learning about hardware security. The boards currently have the capacity to support a dozen experiments that recreate different types of hardware security fundamentals, attacks, and countermeasures used in their defense.<\/p>\n\n\n\n<p><strong>Download Links:<\/strong><br><a href=\"https:\/\/hwsecuritybook.org\/download\/haha-design_files_s\/\">Design Files<\/a> <a href=\"https:\/\/cadforassurance.org\/wp-content\/uploads\/HAHA_Board_Testing_Checklist.pdf\" data-type=\"link\" data-id=\"https:\/\/cadforassurance.org\/wp-content\/uploads\/HAHA_Board_Testing_Checklist.pdf\">Testing Manuel<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hands-on Hardware Security Course Materials<\/strong><\/h2>\n\n\n\n<p><br><strong>Course Description:<\/strong><br>This course focuses on practical learning of computer hardware security using a hands-on approach. Students will perform a set of well-designed experiments on a custom-designed hardware platform, called HaHa, to understand innards of a computer system and ethically \u201chack\u201d into it at different levels. They will examine it to understand security vulnerabilities, mount attacks, and implement various countermeasures to protect against specific attacks on hardware. The attacks the course covers are diverse in nature spanning various hardware components and life-cycle stages \u2013 they include reverse-engineering, counterfeiting\/cloning, side-channel, fault-injection, and physical tampering (e.g., hardware Trojan, mod-chip) attacks.<\/p>\n\n\n\n<p>The custom-designed hardware platform is called&nbsp;<strong>Ha<\/strong>rdware&nbsp;<strong>Ha<\/strong>cking board (HaHa). It is an experimental development board for teaching and learning on diverse aspects of hardware security. The board currently has the capacity to support over a dozen experiments (provided below) that recreate different types of hardware security fundamentals, attacks, and countermeasures used in their defense for learning all major aspects of hardware security. The HaHa board can be fabricated using the design files publicly available through this website (as well as the&nbsp;<em><a href=\"https:\/\/hwsecuritybook.org\/\">Hands-on Hardware Security<\/a><\/em>&nbsp;Book website) or can be acquired from third-party vendors.<\/p>\n\n\n\n<p>The HaHa board and 16 experiments (including Experiment 0) designed to run on it have been developed by<a href=\"https:\/\/swarup.ece.ufl.edu\/index.html\">&nbsp;Prof. Swarup Bhunia<\/a>&nbsp;with help of his students and collaborators, at the&nbsp;<a href=\"https:\/\/www.ece.ufl.edu\/\">Electrical and Computer Engineering Department<\/a>&nbsp;of&nbsp;<a href=\"https:\/\/www.ufl.edu\/\">University of Florida<\/a>, where the&nbsp;<strong><em>Hands-on Hardware Security course<\/em><\/strong>&nbsp;is being offered each fall for past five years.<\/p>\n\n\n\n<p>The experiments can be run on the HaHa board by connecting it to a computer and without need of any additional benchtop electrical measurement unit. Hence, this course is suitable for online learning since it does not require access to a physical lab. Note that few experiments, however, (e.g., Experiment 9) require access to a USB Oscilloscope, such as Analog Discovery 2. Instructors are welcome to choose any subset of these experiments into their offered course depending on course duration and other factors.<br><br><strong>Included Devices<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AX10 FPGA (10M50SAE144C8G)<\/li>\n\n\n\n<li>ATMega16U4 Microcontroller<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Download Links for HaHa Board:<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/hwsecuritybook.org\/download\/haha-design_files_s\/\">Design Files<\/a> <a href=\"https:\/\/cadforassurance.org\/wp-content\/uploads\/HAHA_Board_Testing_Checklist.pdf\">Testing Manual<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hands-on Experiments:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_0_self_test.pdf\"><strong>Experiment 0:<\/strong>&nbsp;Learning the HaHa Platform<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Self_test_code.zip\">Experiment Code<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/FAQ.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FAQ<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Software-Installation-Tutorial.pdf\">Software Installation Instructions<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/usb-blaster.zip\">USB-Blaster Installer<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/MAX10_pin_assignments.qsf\">MAX10 Pin Assignments<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_1_buffer_overflow.pdf\"><strong>Experiment 1:<\/strong>&nbsp;Buffer Overflow<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_1_code.zip\">Experiment Code<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_2_information_security.pdf\"><strong>Experiment 2:<\/strong>&nbsp;Information Security: Encryption\/Decryption<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_2_code.zip\">Experiment Code<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_3_bus_snooping.pdf\"><strong>Experiment 3:<\/strong>&nbsp;Bus Snooping Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_3_code.zip\">Experiment Code<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_4_trojan_1.pdf\"><strong>Experiments 4 and 5:<\/strong>&nbsp;Hardware Trojan Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;Two Weeks)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_4_trojan_1.pdf\">Experiment 4: Instructions<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_4_code.zip\">Experiment 4: Code<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_5_trojan_2.pdf\">Experiment 5: Instructions<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_5_TempCodeConversion.xlsx\">Experiment 5: Temperature Code Conversion Sheet<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_6_reverse_engineering.pdf\"><strong>Experiment 6:<\/strong>&nbsp;Reverse Engineering Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_7_hw_based_security_primitives.pdf\"><strong>Experiment 7:<\/strong>&nbsp;Hardware-Based Security Primitives (PUFs and TRNGs)<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;Two Weeks)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_7_code.zip\">Experiment Cod<\/a><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_8_modchip.pdf\">e<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_8_modchip.pdf\"><strong>Experiment 8:<\/strong>&nbsp;Modchip Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_9_side_channel.pdf\"><strong>Experiment 9:<\/strong>&nbsp;Side Channel (Power) Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;Two Weeks)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_9_part_1.zip\">Experiment Code<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_9_part_1.zip\">Experiment Code Part I<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1-0nKZxThEkUMViYVioLvjT61zvUU-xQd\/view?usp=sharing\">Experiment Code Part II (MATLAB)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1-1RsdUgTIxEkZkaE4sYEAsHqEmEWK3ok\/view?usp=sharing\">Experiment Code Part II (Python)<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_10_fault_injection.pdf\"><strong>Experiment 10:<\/strong>&nbsp;Fault Injection Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_10_code.zip\">Experiment Code<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_11_bitstream.pdf\"><strong>Experiment 11:<\/strong>&nbsp;Reverse Engineering of FPGA Bitstream<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_12_security_policy.pdf\"><strong>Experiment 12:<\/strong>&nbsp;System-on-Chip (SoC) Security Policies<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_13_jtag.pdf\"><strong>Experiment 13:<\/strong>&nbsp;JTAG Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_14_obfuscation.pdf\"><strong>Experiment 14:<\/strong>&nbsp;Hardware Obfuscation and Logic Locking<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_14_code.zip\">Experiment Code<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_15_Bluetooth.pdf\"><strong>Experiment 15:<\/strong>&nbsp;Bluetooth Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;One Week)<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_16_oracle_based_attacks.pdf\"><strong>Experiment 16:<\/strong>&nbsp;Oracle-Based Attacks<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;Two Weeks)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_16_code.zip\">Experiment Code<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_17_scan_protection.pdf\"><strong>Experiment 17:<\/strong>&nbsp;Scan Chain Protection<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;Two Weeks)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_17_code.zip\">Experiment Code<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_18_hw_watermarking.pdf\"><strong>Experiment 18:<\/strong>&nbsp;Hardware Watermarking<\/a>&nbsp;(<strong>Suggested Duration:<\/strong>&nbsp;Two Weeks\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/cadforassurance.org\/wp-content\/uploads\/Experiment_18_code.zip\">Experiment Code<\/a><br><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Developers and Contributors:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dr. Shuo Yang<\/li>\n\n\n\n<li>Reiner Dizon-Paradis<\/li>\n\n\n\n<li>Pravin Gaikwad<\/li>\n\n\n\n<li>Christopher Vega<\/li>\n\n\n\n<li>Miles F Mulet<\/li>\n\n\n\n<li>Dr. Yier Jin<\/li>\n\n\n\n<li>Dr. Swarup Bhunia<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>References<\/strong><\/h2>\n\n\n\n<p>Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup<\/p>\n\n\n\n<p><a>Hands-on Learning of Hardware and Systems Security<\/a>&nbsp;<strong>Journal Article<\/strong><\/p>\n\n\n\n<p>In:&nbsp;ASEE,&nbsp;vol. 9,&nbsp;no. 2,&nbsp;pp. 1-25,&nbsp;2021.<\/p>\n\n\n\n<p><a>Abstract<\/a>&nbsp;|&nbsp;<a>Links<\/a>&nbsp;|&nbsp;<a>BibTeX<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Acknowledgement<\/strong><\/h2>\n\n\n\n<p>The development of the&nbsp;<strong><em>HaHa educational platform<\/em><\/strong>&nbsp;and the&nbsp;<em><strong>Hands-on Hardware Security<\/strong><\/em>&nbsp;experiments was supported in part by National Science Foundation (NSF) through grants&nbsp;<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1603480&amp;HistoricalAwards=false\" target=\"_blank\" rel=\"noreferrer noopener\">1603480<\/a>&nbsp;\u2013&nbsp;TUES:Type1:Collaborative: An Integrative Hands-on Approach to Security Education for Undergraduate Students, and&nbsp;<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=1623310&amp;HistoricalAwards=false\">1623310&nbsp;<\/a>\u2013 Collaborative: HACE Lab: An Online Hardware Security Attack and Countermeasure Evaluation Lab.<\/p>\n\n\n\n<p>We expect the instructors, students, and practitioners using the materials provided in this page will appropriately acknowledge the developers, contributors, and sponsors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Copyright Notices<\/strong><\/h2>\n\n\n\n<p>The course materials are made available here for educational purposes and users need to follow academic fair use policy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Video Demo of Experiment 0 (Learning the HaHa&nbsp;Platform<\/strong>)<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"HaHa Board Self Test Demo\" width=\"1640\" height=\"923\" src=\"https:\/\/www.youtube.com\/embed\/TQJtm_sZzSk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Video Demo of Experiment 7: Hardware-based Primitives<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Hands-on Hardware Security - Experiment 7 - Video Guide\" width=\"1640\" height=\"923\" src=\"https:\/\/www.youtube.com\/embed\/QVpM_ZiaxHI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Video Demo of Experiment 9: Side Channel Attacks<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Hands-on Hardware Security - Experiment 9 - Video Guide\" width=\"1640\" height=\"923\" src=\"https:\/\/www.youtube.com\/embed\/5wURr6tieU0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Video Demo from IEEE-CEDA Webinar<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CAD for Assurance: Hands-On Hardware Assurance - Select Experiments On A Flexible Training Platform\" width=\"1640\" height=\"923\" src=\"https:\/\/www.youtube.com\/embed\/ymoCc_rYjtk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description:The HArdware HAcking boards are experimental development boards for teaching and learning about hardware security. The boards currently have the capacity to support a dozen experiments that recreate different types of hardware security fundamentals, attacks, and countermeasures used in their defense. Download Links:Design Files Testing Manuel Hands-on Hardware Security Course Materials Course Description:This course focuses [&hellip;]<\/p>\n","protected":false},"author":1411,"featured_media":4853,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page-sidebar-none.php","meta":{"_acf_changed":false,"inline_featured_image":false,"featured_post":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-4811","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/pages\/4811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/users\/1411"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/comments?post=4811"}],"version-history":[{"count":20,"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/pages\/4811\/revisions"}],"predecessor-version":[{"id":4861,"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/pages\/4811\/revisions\/4861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/media\/4853"}],"wp:attachment":[{"href":"https:\/\/faculty.eng.ufl.edu\/swarup\/wp-json\/wp\/v2\/media?parent=4811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}