2025 UK-US Semiconductor Security Symposium

The Royal Society, 6-9 Carlton House Terrace, London,
8th-9th October 2025.

This workshop brings together leading UK and US industry, government and academic experts in semiconductor security to explore the challenges and opportunities in this sector. Alongside talks on emerging research and industry challenges, we will also be hosting round table discussions to deep dive further into the following themes and discuss how we can move forward with recommendations. The themes are:

Theme 1: Secure-by-Design Hardware Foundations

Theme 2: AI-Enabled Security Design & Verification

Theme 3: Supply Chain Integrity and Hardware Vulnerability Intelligence

Theme 4: Open-Source Security IP and Ecosystem Cohesion

Link to Final Agenda

Workshop Chairs


Prof. Máire O’Neill, FREng
Regius Professor in Electronics and Computer Engineering, Director, Research Institute in Secure Hardware & Embedded Systems (RISE), Queens University Belfast, UK

Prof. Mark M. Tehranipoor
Intel Charles E. Young Pre-eminences Endowed Chair Professor in Cybersecurity, Chair, Department of ECE, University of Florida, US

Speakers

Day 1 Agenda – 8th October 2025
09:00 – 10:00Registration – Tea / Coffee / Refreshments
10:00 – 10:15Opening Remarks / Welcome
Maire O’Neill & Mark Tehranipoor
10:15 – 10:30Update on Implementation of UK Semiconductor Strategy
Richard Duffy, Head of Innovation Policy, Semiconductors,
Department for Science, Innovation and Technology (DSIT)
10:30 – 10:45Sid Allman (Marvell Technologies)
10:45 – 11:05Peter Davies (Thales e-Security)
11:05 – 11:25Chirag Shroff (Cisco)
11:25 – 11:45Break & Networking
11:45 – 13:00Emerging Research Session – 10 min talks:
– Farimah Farahmandi, University of Florida
– David Oswald, Durham University
Systems for secure (?) AI implementation
– Ahmad Atamli, University of Southampton
Trusted Execution Environment Beyond the CPU
– Waleed Khalil, Ohio State University
Sensing Trust: Enabling Secure Attestation Through Sensor-Driven Silicon
– John Goodenough, University of Sheffield
CHIMES – Securing Heterogeneous Integrated Semiconductor Systems
13:00 – 14:00 Lunch & Networking
14:00 – 14:20Carl Shaw (Codasip)
14:20 – 14:40Patrick Ekdahl (Ericsson)
14:40 – 15:00Aleksander Nowicki (Intel)
Confidential Computing AKA Trusted Execution Environments
15:00 – 15:30Break & Networking
15:30 – 16:30Breakout Discussion:
Theme 1: Secure-by-Design Hardware Foundations
Theme 2: AI-Enabled Security Design & Verification
16:30 – 16:55Breakout Discussion Feedback
– Report back on high-level ideas from discussions
16:55 – 17:00Closing Remarks
19:00Dinner:
The Royal Horseguards Hotel, 2 Whitehall Court London SW1A 2EJ
Day 2 Agenda – 9th October 2025
09:00 – 09:30Registration – Tea / Coffee / Refreshments
09:30 – 09:40Day 2 Welcome
Dr Philip Hodgers, RISE
09:40 – 09:55NCSC Representative
09:55 – 10:15Dr Alieeldin Mady (Qualcomm)
EU Cyber Resiliency Act (CRA) Implementation & Challenges
10:15 – 10:30Prof John Goodacre, Director Security and Resilience, UKRI
10:30 – 11:15Panel Discussion – Skills and Training: Industry, academia and government perspectives on building a semiconductor security workforce
Chair: Sarah Munro, DSIT
Panellists:
Prof Mark Tehranipoor, University of Florida
Professor John Goodenough, University of Sheffield
Whitney Batchelor, Graf Research
James Sharp, Principal Scientist, DSTL
11:15 – 11:45Break & Networking
11:45 – 12:05Dr Jonathan Graf (Graf Research)
Blind Spots, Truth, and Measurement: R&D for Commercial Microelectronics in Defense and Defence
12:05 – 13:05Emerging Research Session – 10 min talks:
– Simon Moore, University of Cambridge
CHERI Security – Pathways to Commercial Adoption
– Aydin Aysu, North Carolina State University
Hardware-Enabled Governance for Advanced Semiconductor Chips
– Amro Awad, University of Oxford, Enabling Efficient Confidential Computing for Emerging Platforms
– Ankur Srivastava, University of Maryland
Security Considerations for Heterogeneous Integration Based AI Processors
– Ihsen Alouani, Queen’s University Belfast
Trusting the Untrustworthy? Rethinking AI-based Hardware Trojan Detection
13:05 – 14:05Lunch & Networking
14:05 – 15:00Breakout Discussion:
Theme 3: Supply Chain Integrity and Hardware Vulnerability Intelligence
Theme 4: Open-Source Security IP and Ecosystem Cohesion
15:00 – 15:25Breakout Discussion Feedback
— Report back on high-level ideas from discussions
15:25 – 15:30Closing Remarks