Fig. 22From: A security method of hardware Trojan detection using path tracking algorithmComparison of the number of multiplexers required among benchmarks for the wire coverage. By using a combination of the path tracking and multiplexer match algorithms, comparison of the number of multiplexers required for the wire coverage is illustrated in this FigureBack to article page