Workshops and Tutorials Overview
12:30 – 17:30 • Lounge
Organizer: TU Delft & Leiden University
13:30 – 15:00 • Breakoutzaal 1+2
15:00 – 15:30 • Lounge
Organizer: TU Delft & Leiden University
15:30 – 17:30 • Breakoutzaal 1+2
08:00 – 17:30 • Lounge
Organizer: University of Twente
08:30 – 10:30 • Breakoutzaal 1+2
Organizer: AMD
08:30 – 10:30 • Congreszaal B
10:30 – 11:00 • Lounge
Organizer: University of Twente
11:00 – 12:30 • Breakoutzaal 1+2
Organizer: AMD
11:00 – 12:30 • Congreszaal B
12:30 – 13:30 • Lounge
Organizer: EPFL & Brigham Young University
13:30 – 15:00 • Breakoutzaal 1+2
15:00 – 15:30 • Lounge
Organizer: EPFL & Brigham Young University
15:30 – 17:30 • Breakoutzaal 1+2
Detailed Program
Exploring the new AMD AUP-ZU3 Academic Platform
Type: Tutorial
Organizers/Speakers: Mario Ruiz, AMD University Program, AMD
This tutorial will introduce the AUP-ZU3, the latest AMD University Program SoC academic platform. This platform is designed to serve education and research, catering for both learners and experienced users. This board can be used in multiple areas, including digital design, computer architecture and embedded systems, among others. The AUP-ZU3 board is powered by a ZU3 AMD Zynq™ Ultrascale+™ MPSoC device and it features a variety of interfaces (I/O) - LEDs, switches, buttons, Pmod™, MIPI, Display Port, etc. - that makes it applicable broadly in academia. It is also supported by the popular open source PYNQ framework. As part of the tutorial, we will cover the Vivado™ design flow and how to target the AUP-ZU3 platform. We will discuss what is new in Vivado and Vitis™ HLS. This will give the audience an idea of the development flow not only for the AUP-ZU3 but also for other adaptive computing devices. Then, we will describe how PYNQ™ - Python productivity for adaptive computing platforms - uses Python and Jupyter™ notebooks to make AMD SoC more accessible. We will demonstrate this with a few examples on the AUP-ZU3 board. We will talk about the latest PYNQ (release 3.1) features and how they help its users be more productive. In the second part, the participants will engage in a hands-on session with the newest AUP-ZU3 board, booting it up and exploring example designs using PYNQ. Advanced users will have the opportunity to design their own overlays and download it onto the board. By participating in this tutorial, attendees will gain valuable practical skills that can be directly applied in educational and research settings.
Workshop on Security for Custom Computing Machines (SCCM)
Type: Workshop
Organizers:
Mirjana Stojilović, Scientist, EPFL, Switzerland
Jeff Goeders, Associate Professor, Brigham Young University, United States
Featured Speakers:
-
Durga Lakshmi-Ramachandran, Innovation Director, Keysight Device
Security Solutions
We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around “harvest now, decrypt later” attacks. Algorithms such as CRYSTALS-Kyber and CRYSTALS-Dilithium, selected as NIST standards, are built on well-studied and mathematically robust foundations. However, strong algorithmic design alone is not enough. A cryptographic system remains vulnerable if the implementation is insecure—algorithmic security does not guarantee implementation security. We will see example on how Fault Injection could be still relevant for PQC.
-
Guy Gogniat, Professor, Université Bretagne Sud
In this talk we will discuss some contributions to the security of processor-based systems in the context of embedded devices. We will discuss a solution to ensure constant-time computation and how the cache architecture can be extended to ensure constant-time properties. This approach exploits the software-hardware interface by extending ISA RISC-V to lock and unlock some sensitive data in the cache.
-
Jonathan Graf, CEO, Graf Research
Dr. Jonathan Graf, CEO of Graf Research, will share how Graf Research is developing a new generation of configurable computing tools for electronic design automation and verification—tools that create independent, trustworthy views of FPGA configuration and silicon correctness. Among these innovations is a method for bitstream equivalence checking, Enverite PV-Bit, which confirms whether an FPGA’s bitstream truly matches the intended gate-level netlist. Another is Ensofic, a silicon attestation platform that combines soft sensors with machine learning to evaluate both the reliability and authenticity of an FPGA, including the ability to spot counterfeit devices. The talk will also cover what it takes to turn research prototypes into practical, commercial-grade solutions ready for deployment in high-stakes industries like aerospace, automotive, defense, and energy. Drawing on hands-on experience with deployed commercial solutions, Dr. Graf will outline key lessons learned and show how these projects have inspired unexpected new applications. The result is a clear picture of challenges and how the security of custom computing machines can advance rapidly in the years ahead.
-
Trevor E. Carlson, Associate Professor, National University of
Singapore
Side-channel attacks using power- and EM-based methods have long been demonstrated in traditional ASIC systems. But, other physical side-channels have also played a role in reconfigurable hardware systems, including the detection of voltage changes in shared FPGA settings. Prior studies have proposed various malicious circuit designs that exploit combinations of traditional FPGA logic resources, i.e., Look-up Tables (LUTs), carry chains (CARRY), routing resources, and flip-flops (FFs). While bitstream checks have been added to the compiler and synthesis flows to mitigate these issues, there remain a number of additional resources of leakage that are an integral part of the FPGA, such as the DSP blocks used for complex mathematical operations, that, up to now, have not been exploited. In this talk, we will discuss two recent works that explain FPGA components as side channels. In the first work, LeakyDSP, I will discuss the use of DSP blocks to sense fine-grained voltage fluctuations, and in our other recent work, AmpereBleed, I will discuss how widely available sensors in ARM-FPGA SoCs can be used to exploit current-based side-channels. Taken together, this presentation aims to demonstrate that modern FPGA SoCs remain vulnerable to side-channel attacks, and that we need to continue to work to build new protections to prevent these recently discovered attacks.
- Barbora Hrda, TUM
- Zhuoran Liu, Radboud University
- Nicolai Müler, Ruhr University Bochum
- Francesco Regazzoni, USI and University of Amsterdam
- Shreejith Shanker, Trinity College Dublin
- Jo Vliegen, ES&S/COSIC, ESAT, KU Leuven, Diepenbeek, Belgium
For more information about the talks, please visit the workshop website. The complete timetable is also available on the workshop schedule page.
Interest in hardware security and secure computing systems continues to grow. Recent events have raised awareness of security in general-purpose processors. However, addressing security in custom computing machines is also of high importance, given their increasing use in environments where security and privacy are paramount, including defense, medical, transportation, and communication systems. The SCCM workshop allows researchers in this space to present recent work, discuss current security priorities, and collaborate on future research directions.
FIRE-NL: Workshop on FPGA Innovation Research Exchange in the Netherlands
Type: Workshop
Organizers:
Nikolaos Alachiotis, Assistant professor, University of Twente, The Netherlands
Zaid Al-Ars, Associate professor, Delft University of Technology, The Netherlands
Roel Jordans, Assistant Professor, Eindhoven University of Technology,
The Netherlands
Mohsen Safari, Advisor, SURF (where it hosts Dutch national supercomputer
Snellius), The Netherlands
Time | Title/Content | Speaker(s) |
---|---|---|
8:30 - 08:40 | Opening and presentation of the national FIRE survey on FPGA research in academia and industry | Zaid Al-Ars (TU Delft) Nikolaos Alachiotis (UT) |
08:40 - 09:40 | Adaptive Computing Three presentations on using Adaptive computing platforms (Versal) for non-AI applications | Phylogenetics (Geert Roks, ETH Zurich) Signal processing using TINA (Christiaan Boerkamp, TU Delft) BLAS library (Tiziano de Matteis, Vrije Universitaet Amsterdam) |
09:40 - 10:30 | High-level HW Design Two presentations on increasing the abstraction level of HW design | The ins and outs of the Clash Haskell-to-VHDL compiler
(Christiaan Baaij, QBayLogic) The Tydi ecosystem: tools and algorithms for enabling composable HW design (Casper Cromjongh and Jarl Brand, TU Delft, and Raffaele Meloni, Q*Bird) |
10:30 - 11:00 | Break | |
11:00 – 12:30 | Dutch research highlights Three presentations on using FPGAs in various applications in the field | Ultra low-latency analysis of stock market transactions
(Maurice Daverveld, Optiver) Spiking neural networks on FPGA (Federico Corradi, TU/e) Radiation testing of RISC-V on flash-based FPGAs (Gianluca Furrano, ESA) |
The workshop at FPL2025 will highlight the growing importance of FPGA technology for high-performance computing and data analytics (HPCDA), emphasizing its superior energy efficiency compared to GPUs and CPUs. Despite these advantages, FPGA adoption remains limited due to complex programming and lack of awareness beyond the FPGA community. Building on the success of the FIRE initiative and the HW Acceleration Network NL, which have fostered a vibrant Dutch FPGA ecosystem, this workshop aims to showcase Dutch research, catalyze international collaboration, and address emerging challenges in adaptive computing platforms that combine FPGAs with CPUs and AI accelerators.
FPGAs in Action: Real-World Neuromorphic Computing Applications
Type: Tutorial
Organizers/speakers:
Chang Gao, Assistant professor, Delft University of Technology, The Netherlands
Antonio Rios-Navarro, Associate Professor, University of Seville, Spain
Qinyu Chen, Assistant professor, Leiden University, The Netherlands
Tobi Delbruck, Professor of Physics and Electrical Engineering, ETH Zurich,
Switzerland
This tutorial will provide a comprehensive overview of the practical application and deployment of neuromorphic computing systems using FPGAs. Moving beyond theoretical aspects and simulations, it will focus on real-world case studies, implemented systems, and tangible results, with special emphasis on the intersection of event-driven sensing and robotics. The tutorial will showcase successful applications where FPGAs power neuromorphic solutions in domains such as robotics, autonomous systems, healthcare, and IoT. It will cover neuromorphic sensing and perception for robotics, demonstrating how event-driven computation enables tasks like object recognition, tracking, and robot navigation. Participants will learn about hardware-software co-design challenges and strategies for mapping complex neuromorphic algorithms efficiently to FPGA architectures.
Featured Talks



