Fig. 12From: A security method of hardware Trojan detection using path tracking algorithmBrief flowchart of a path tracking algorithm. A Verilog file is first read to build matrices of a circuit configuration. Subsequently, a path tracking and multiplexer match algorithms are presented to improve the detection coverageBack to article page