Fig. 13From: A security method of hardware Trojan detection using path tracking algorithmContents of a Verilog file. A Verilog file contains the circuit interconnection informationBack to article page