From: A security method of hardware Trojan detection using path tracking algorithm
Path
Intersection
2
2→3→5
3
2→3→6
4
2→4→6