Fig. 19From: A security method of hardware Trojan detection using path tracking algorithmNet coverage comparison of the combined algorithms among benchmarks. A combined use of the path tracking and the multiplexer match algorithms improve the net coverage through a proper choice of multiplexersBack to article page