Skip to content
Back Home
  • About
    • The mission
    • Contacts
    • People who are involved
    • External Advisory Board
  • News
  • Events
    • 10th SmartData@PoliTO Workshop – Present and Future Directions
    • 9th SmartData@PoliTO Workshop – SmartData@PoliTO meets AI-H@PoliTO
    • La biblioteca nel metaverso – la Reading & Machine
  • Workshops
    • Seminars
      • AI4Industry – the role of AI and Data-driven Analysis in the Future of European Industry
      • On the dynamics of music virality and its relation with mainstream success
      • Bypass frauds in cellular networks: from Financial strikes to Data poisoning
    • SmartTalks
  • Education
    • Courses for PhD students
    • PhD Course: Topological Data Analysis
    • PhD Course: Data Science for Networks
    • Corporate training on Digital Transformation
  • Research
    • Publications
    • Current PhD
    • Projects
    • Open Datasets & Libraries
    • Topics
  • Open Positions
    • open position – PhD student
    • open position – Assistant Professor with time contract (RTD-A)
    • open position – PostDoc researchers
    • Open position – Technologist
  • BigData Cluster
    • Computing Facilities
    • Request BigData@Polito Account
    • BigData@Polito Access Instructions
    • Run Jobs with Custom Packages
  • Private Area
  • Search
Back Home
  • About
    • The mission
    • Contacts
    • People who are involved
    • External Advisory Board
  • News
  • Events
    • 10th SmartData@PoliTO Workshop – Present and Future Directions
    • 9th SmartData@PoliTO Workshop – SmartData@PoliTO meets AI-H@PoliTO
    • La biblioteca nel metaverso – la Reading & Machine
  • Workshops
    • Seminars
      • AI4Industry – the role of AI and Data-driven Analysis in the Future of European Industry
      • On the dynamics of music virality and its relation with mainstream success
      • Bypass frauds in cellular networks: from Financial strikes to Data poisoning
    • SmartTalks
  • Education
    • Courses for PhD students
    • PhD Course: Topological Data Analysis
    • PhD Course: Data Science for Networks
    • Corporate training on Digital Transformation
  • Research
    • Publications
    • Current PhD
    • Projects
    • Open Datasets & Libraries
    • Topics
  • Open Positions
    • open position – PhD student
    • open position – Assistant Professor with time contract (RTD-A)
    • open position – PostDoc researchers
    • Open position – Technologist
  • BigData Cluster
    • Computing Facilities
    • Request BigData@Polito Account
    • BigData@Polito Access Instructions
    • Run Jobs with Custom Packages
  • Private Area
Home » Publications » An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation

An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation

Andrea Marcelli, Marco Restifo, Ernesto Sanchez, Giovanni Squillero (2017) An Evolutionary Approach to Hardware Encryption and Trojan-Horse Mitigation, In: Proceedings, ISBN: 978-1-5090-5826-6

Post navigation

  • Previous post Smart techniques for flying-probe testing
  • Back to post list
  • Next post The Maximum Common Subgraph Problem: A Parallel and Multi-Engine Approach

Collaborations

 

© 2025 SmartData@PoliTO – All rights reserved

Homepage - Privacy - Cookie Policy - Contacts