{"id":5314,"date":"2025-05-22T05:05:11","date_gmt":"2025-05-22T05:05:11","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=5314"},"modified":"2025-05-22T05:05:13","modified_gmt":"2025-05-22T05:05:13","slug":"program","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\"><nav class=\"is-responsive items-justified-center wp-block-navigation is-content-justification-center is-layout-flex wp-container-core-navigation-layout-1 wp-block-navigation-is-layout-flex\" aria-label=\"AICAD4Sec Workshop 2025\" \n\t\t\tdata-wp-interactive\n\t\t\tdata-wp-context='{\"core\":{\"navigation\":{\"overlayOpenedBy\":[],\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}}}'\n\t\t><button aria-haspopup=\"true\" aria-label=\"Open menu\" class=\"wp-block-navigation__responsive-container-open \" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.openMenuOnClick\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t<div class=\"wp-block-navigation__responsive-container  \" style=\"\" id=\"modal-1\" \n\t\t\tdata-wp-class--has-modal-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-class--is-menu-open=\"selectors.core.navigation.isMenuOpen\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.initMenu\"\n\t\t\tdata-wp-on--keydown=\"actions.core.navigation.handleMenuKeydown\"\n\t\t\tdata-wp-on--focusout=\"actions.core.navigation.handleMenuFocusout\"\n\t\t\ttabindex=\"-1\"\n\t\t>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\tdata-wp-bind--aria-modal=\"selectors.core.navigation.ariaModal\"\n\t\t\tdata-wp-bind--aria-label=\"selectors.core.navigation.ariaLabel\"\n\t\t\tdata-wp-bind--role=\"selectors.core.navigation.roleAttribute\"\n\t\t\tdata-wp-effect=\"effects.core.navigation.focusFirstElement\"\n\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Close menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\tdata-wp-on--click=\"actions.core.navigation.closeMenuOnClick\"\n\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13 11.8l6.1-6.3-1-1-6.1 6.2-6.1-6.2-1 1 6.1 6.3-6.5 6.7 1 1 6.5-6.6 6.5 6.6 1-1z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" id=\"modal-1-content\">\n\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container is-responsive items-justified-center wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/\"><span class=\"wp-block-navigation-item__label\">Home<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/oc_workshop_2025\/\"><span class=\"wp-block-navigation-item__label\">Workshop Organizers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/speakers_25\/\"><span class=\"wp-block-navigation-item__label\">Speakers<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/program\/\"><span class=\"wp-block-navigation-item__label\">Program<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/nav><\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"style-675 style-local-591-c1 position-relative\" data-colibri-id=\"591-c1\">\n<div id=\"custom\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-680 style-local-591-c2 position-relative\" data-colibri-component=\"section\" data-colibri-id=\"591-c2\">\n<div class=\"h-section-grid-container h-section-boxed-container\">\n<div class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-681 style-local-591-c3 position-relative\" data-colibri-id=\"591-c3\">\n<div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n<div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-682-outer style-local-591-c4-outer\">\n<div class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-682 style-local-591-c4 position-relative\" data-colibri-id=\"591-c4\">\n<div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n<div class=\"h-global-transition-all h-heading style-683 style-local-591-c5 position-relative h-element\" data-colibri-id=\"591-c5\">\n<div class=\"h-heading__outer style-683 style-local-591-c5\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"reusable-sections\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-687 style-local-591-c6 position-relative\" data-colibri-component=\"section\" data-colibri-id=\"591-c6\">\n<div class=\"h-section-grid-container h-section-boxed-container\">\n<div class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-688 style-local-591-c7 position-relative\" data-colibri-id=\"591-c7\">\n<div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n<div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-1501-outer style-local-591-c24-outer\">\n<div class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-1501 style-local-591-c24 position-relative\" data-colibri-id=\"591-c24\">\n<div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n<div class=\"h-x-container style-1502 style-local-591-c25 position-relative h-element\" data-colibri-id=\"591-c25\">\n<div class=\"h-x-container-inner style-dynamic-591-c25-group style-1502-spacing style-local-591-c25-spacing\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<table id=\"tablepress-4\" class=\"tablepress tablepress-id-4\">\n<thead>\n<tr class=\"row-1 odd\">\n\t<th class=\"column-1\"><strong>Time <\/strong><\/th><th class=\"column-2\"><strong>Event<\/strong><\/th><th class=\"column-3\"><strong>Speakers\/Panelists<\/strong><\/th><th class=\"column-4\"><strong>Slides<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\">8:50 \u2013 9:00<\/td><td class=\"column-2\"><strong>Welcoming Remarks<\/strong><br \/>\n<br \/>\n<\/td><td class=\"column-3\"><b> Farimah Farahmandi <\/b><br \/>\n<em>Assistant Professor, FICS Associate Director, <b>University of Florida<\/b><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\">9:00 \u2013 9:30<\/td><td class=\"column-2\"><strong>Keynote Address 1<\/strong><\/td><td class=\"column-3\"><b> Jon Azen <\/b><br \/>\n<em>Senior Director, <b>Qualcomm<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"TBD\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\">9:30 \u2013 9:50<\/td><td class=\"column-2\"><strong> Invited Talk <\/strong><\/td><td class=\"column-3\"><b> Qiaoyan Yu <\/b><br \/>\n<em>Professor, <b>University of New Hampshire<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Mitigating Voltage-Drop Attacks through Intelligent On-Chip Sensor Utilization\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\">9:50 \u2013 10:10<\/td><td class=\"column-2\"><strong> Invited Talk <\/strong><\/td><td class=\"column-3\"><b> Amitabh Das <\/b><br \/>\n<em>Principal Security Hardware Architect, <b>AMD<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Pre-simulation based Side-channel Analysis\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\">10:10 \u2013 10:30<\/td><td class=\"column-2\"><strong> Invited Talk <\/strong><\/td><td class=\"column-3\"><b> Soheil Salehi <\/b><br \/>\n<em>Assistant Professor, <b>University of Arizona<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Defense Against the Dark Arts: Hardware Design and Security in the Age of GenAI\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\">10:30 \u2013 11:00<\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><strong> BREAK <\/strong><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\">11:00 \u2013 11:30<\/td><td class=\"column-2\"><strong>Keynote Address 2<\/strong><\/td><td class=\"column-3\"><b>Norman Chang<\/b><br \/>\n<em>Chief Technologist, <b>Ansys<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Harnessing ML and Agentic AI for Hardware Security Simulation in 3D Heterogeneous Integration\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\">11:30 \u2013 11:50<\/td><td class=\"column-2\"><strong> Invited Talk <\/strong><\/td><td class=\"column-3\"><b> Hadi Kamali <\/b><br \/>\n<em>Assistant Professor, <b>University of Central Florida<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Can a Language Model Be Your Hardware Security Co-Designer and Verifier?\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\">11:50 \u2013 12:10<\/td><td class=\"column-2\"><strong> Invited Talk <\/strong><\/td><td class=\"column-3\"><b> Avinash Ayalasomayajula <\/b><br \/>\n<em>Senior Research and Development Engineer, <b>Caspia Technologies<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"LLM Assisted SoC Security Verification\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\">12:10 \u2013 12:30<\/td><td class=\"column-2\"><strong> Invited Talk <\/strong><\/td><td class=\"column-3\"><b> Aydin Aysu <\/b><br \/>\n<em>Associate Professor, <b>North Carolina State University<\/b><\/em><br \/>\n<em>President &amp; Founder, <b> mitrhilAI Corp.<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Deus Ex LLMs: AI vs Humans in Post-Quantum Cryptographic Hardware Code Generation\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\">12:30 \u2013 13:30<\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><strong> LUNCH BREAK <\/strong><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\">13:30 \u2013 14:10<\/td><td class=\"column-2\"><strong> Hardware Demonstrations <\/strong><\/td><td class=\"column-3\">by: <b> Students <\/b><br \/>\n<b> Title: <\/b> <em><u>\"LLM for Hardware Security Verification Demo\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\">14:10 \u2013 14:30<\/td><td class=\"column-2\"><strong> Invited Talk <\/strong><\/td><td class=\"column-3\"><b> Reza Azarderakhsh <\/b><br \/>\n<em>Professor, <b>Florida Atlantic University<\/b><\/em><br \/>\n<em>CEO &amp; Founder, <b>PQSecure Technologies<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Hardware Security Challenges in Post-Quantum Cryptography: Insights from Caliptra and Adam\u2019s Bridge\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\">14:30 \u2013 15:00<\/td><td class=\"column-2\"><strong>Keynote Address 3<\/strong><\/td><td class=\"column-3\">Speaker: <b> Chris Giles <\/b><br \/>\n<em>Director of Product Management: Static &amp; Formal, <b>Siemens <\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Assurance in a Secure Future: Automating Hardware Development for Robust Security\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\">15:00 - 15:30<\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><strong> BREAK <\/strong><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\">15:30 \u2013 16:30<\/td><td class=\"column-2\">Panel Discussion: <br \/>\nGenAI for Security OR Security for GenAI?<br \/>\n<br \/>\nOrganizer &amp; Moderator: <br \/>\n<b>Mark Tehranipoor<\/b><br \/>\n<em>Sachio Semmoto Chair of the ECE Department, <b>University of Florida<\/b><\/em><br \/>\n<\/td><td class=\"column-3\">Panelists:<br \/>\n<br \/>\n- <b>Erik Seligman <\/b> \u2013 <em> Sr. Product Engineering Architect at <b>Cadence Design Systems <\/b><\/em><br \/>\n- <b>Mike Borza <\/b> \u2013 <em> Scientist at <b>Synopsys <\/b><\/em><br \/>\n- <b> Siddharth Garg <\/b> \u2013 <em> Associate Professor at <b>New York University<\/b><\/em><br \/>\n- <b> Sazadur Rahman <\/b> \u2013 <em> Assistant Professor at <b>University of Central Florida<\/b><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-18 even\">\n\t<td class=\"column-1\">16:30 \u2013 17:00<\/td><td class=\"column-2\">Closing Thoughts by an Industry Leader<\/td><td class=\"column-3\"><b> Jason Fung<\/b><br \/>\n<em>Senior Director, Offensive Security Research &amp; Academic Research Engagement, <b>Intel Corporation<\/b><\/em><br \/>\n<b> Title: <\/b> <em><u>\"Why My 2.5-Year-Old Struggles with H-D-L: Navigating ChatGPT\u2019s Dysgraphia in Secure Hardware Design\"<\/u><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-19 odd\">\n\t<td class=\"column-1\">17:00 \u2013 17:10<\/td><td class=\"column-2\">Closing Remarks<\/td><td class=\"column-3\"><b> Mark Tehranipoor <\/b><br \/>\n<em>Sachio Semmoto Chair of the ECE Department, <b>University of Florida<\/b><\/em><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-20 even\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-4 from cache -->\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u00a0<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":5299,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/5314"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=5314"}],"version-history":[{"count":1,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/5314\/revisions"}],"predecessor-version":[{"id":5318,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/5314\/revisions\/5318"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/5299"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=5314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}