Fig. 18From: A security method of hardware Trojan detection using path tracking algorithmWire coverage comparison of the combined algorithms among benchmarks. A combined use of the path tracking and the multiplexer match algorithms improve the wire coverage through a proper choice of multiplexersBack to article page