Fig. 23From: A security method of hardware Trojan detection using path tracking algorithmComparison of the number of multiplexers required among benchmarks for the net coverage. By using a combination of the path tracking and multiplexer match algorithms, comparison of the number of multiplexers required for the net coverage is illustrated in this FigureBack to article page