Fig. 12
From: A security method of hardware Trojan detection using path tracking algorithm

Brief flowchart of a path tracking algorithm. A Verilog file is first read to build matrices of a circuit configuration. Subsequently, a path tracking and multiplexer match algorithms are presented to improve the detection coverage