Fig. 21
From: A security method of hardware Trojan detection using path tracking algorithm
![Fig. 21](http://media.springernature.com/full/springer-static/image/art%3A10.1186%2Fs13638-022-02165-9/MediaObjects/13638_2022_2165_Fig21_HTML.png)
Net coverage comparison between both algorithms. By a combined use of the path tracking and multiplexer match algorithms, a 100% net coverage can be reached in a large-scale benchmark