Fig. 10From: A security method of hardware Trojan detection using path tracking algorithmType 2 configuration, a a parallel detection circuit, b a modified version of (a). In Type 2 parallel configuration, a path is added between PATHs. A hardware Trojan is inserted into a path, shown in blue, between PATHs. Figure 10b is a modified version of Fig. 10aBack to article page