Fig. 1From: A security method of hardware Trojan detection using path tracking algorithmIllustrations of hardware Trojans, a combinational case, b analogue case. Two examples of hardware Trojan. One is a combinational case, the other is an analogue caseBack to article page