The Royal Society, 6-9 Carlton House Terrace, London,
8th-9th October 2025.



This workshop brings together leading UK and US industry, government and academic experts in semiconductor security to explore the challenges and opportunities in this sector. Alongside talks on emerging research and industry challenges, we will also be hosting round table discussions to deep dive further into the following themes and discuss how we can move forward with recommendations. The themes are:
Theme 1: Secure-by-Design Hardware Foundations
Theme 2: AI-Enabled Security Design & Verification
Theme 3: Supply Chain Integrity and Hardware Vulnerability Intelligence
Theme 4: Open-Source Security IP and Ecosystem Cohesion
Workshop Chairs
Speakers


Head of Innovation Policy, Semiconductors
DSIT












University of Cambridge





DSTL

Graf Research

This symposium is supported by the UK Department for Science, Innovation and Technology (DSIT).
Day 1 Agenda – 8th October 2025 | |
---|---|
09:00 – 10:00 | Registration – Tea / Coffee / Refreshments |
10:00 – 10:15 | Opening Remarks / Welcome Maire O’Neill & Mark Tehranipoor |
10:15 – 10:30 | Update on Implementation of UK Semiconductor Strategy Richard Duffy, Head of Innovation Policy, Semiconductors, Department for Science, Innovation and Technology (DSIT) |
10:30 – 10:45 | Sid Allman (Marvell Technologies) |
10:45 – 11:05 | Peter Davies (Thales e-Security) |
11:05 – 11:25 | Chirag Shroff (Cisco) |
11:25 – 11:45 | Break & Networking |
11:45 – 13:00 | Emerging Research Session – 10 min talks: – Farimah Farahmandi, University of Florida – David Oswald, Durham University Systems for secure (?) AI implementation – Ahmad Atamli, University of Southampton Trusted Execution Environment Beyond the CPU – Waleed Khalil, Ohio State University Sensing Trust: Enabling Secure Attestation Through Sensor-Driven Silicon – John Goodenough, University of Sheffield CHIMES – Securing Heterogeneous Integrated Semiconductor Systems |
13:00 – 14:00 | Lunch & Networking |
14:00 – 14:20 | Carl Shaw (Codasip) |
14:20 – 14:40 | Patrick Ekdahl (Ericsson) |
14:40 – 15:00 | Aleksander Nowicki (Intel) Confidential Computing AKA Trusted Execution Environments |
15:00 – 15:30 | Break & Networking |
15:30 – 16:30 | Breakout Discussion: Theme 1: Secure-by-Design Hardware Foundations Theme 2: AI-Enabled Security Design & Verification |
16:30 – 16:55 | Breakout Discussion Feedback – Report back on high-level ideas from discussions |
16:55 – 17:00 | Closing Remarks |
19:00 | Dinner: The Royal Horseguards Hotel, 2 Whitehall Court London SW1A 2EJ |
Day 2 Agenda – 9th October 2025 | |
---|---|
09:00 – 09:30 | Registration – Tea / Coffee / Refreshments |
09:30 – 09:40 | Day 2 Welcome Dr Philip Hodgers, RISE |
09:40 – 09:55 | NCSC Representative |
09:55 – 10:15 | Dr Alieeldin Mady (Qualcomm) EU Cyber Resiliency Act (CRA) Implementation & Challenges |
10:15 – 10:30 | Prof John Goodacre, Director Security and Resilience, UKRI |
10:30 – 11:15 | Panel Discussion – Skills and Training: Industry, academia and government perspectives on building a semiconductor security workforce Chair: Sarah Munro, DSIT Panellists: Prof Mark Tehranipoor, University of Florida Professor John Goodenough, University of Sheffield Whitney Batchelor, Graf Research James Sharp, Principal Scientist, DSTL |
11:15 – 11:45 | Break & Networking |
11:45 – 12:05 | Dr Jonathan Graf (Graf Research) Blind Spots, Truth, and Measurement: R&D for Commercial Microelectronics in Defense and Defence |
12:05 – 13:05 | Emerging Research Session – 10 min talks: – Simon Moore, University of Cambridge CHERI Security – Pathways to Commercial Adoption – Aydin Aysu, North Carolina State University Hardware-Enabled Governance for Advanced Semiconductor Chips – Amro Awad, University of Oxford, Enabling Efficient Confidential Computing for Emerging Platforms – Ankur Srivastava, University of Maryland Security Considerations for Heterogeneous Integration Based AI Processors – Ihsen Alouani, Queen’s University Belfast Trusting the Untrustworthy? Rethinking AI-based Hardware Trojan Detection |
13:05 – 14:05 | Lunch & Networking |
14:05 – 15:00 | Breakout Discussion: Theme 3: Supply Chain Integrity and Hardware Vulnerability Intelligence Theme 4: Open-Source Security IP and Ecosystem Cohesion |
15:00 – 15:25 | Breakout Discussion Feedback — Report back on high-level ideas from discussions |
15:25 – 15:30 | Closing Remarks |