Fig. 21From: A security method of hardware Trojan detection using path tracking algorithmNet coverage comparison between both algorithms. By a combined use of the path tracking and multiplexer match algorithms, a 100% net coverage can be reached in a large-scale benchmarkBack to article page