Skip to main content

Table 5 Connections between inputs and nodes

From: A security method of hardware Trojan detection using path tracking algorithm

Input

Gate

1

1

2

3

3

1, 2

6

2

7

4