Fig. 1
From: A security method of hardware Trojan detection using path tracking algorithm

Illustrations of hardware Trojans, a combinational case, b analogue case. Two examples of hardware Trojan. One is a combinational case, the other is an analogue case