Fig. 15From: A security method of hardware Trojan detection using path tracking algorithmA flowchart of the path matches. A path match mechanism is terminated if the three listed conditions are satisfiedBack to article page