Fig. 17From: A security method of hardware Trojan detection using path tracking algorithmNet coverage comparison of the single algorithm among benchmarks. The path tracking algorithm aims to improve the net coverage, while merely employs a 2-to-1 multiplexer. Comparisons for the net coverage among benchmarks are illustrated in this FigureBack to article page