Fig. 4From: A security method of hardware Trojan detection using path tracking algorithmA combination of the ISCAS85 c17 benchmark and a ring oscillator. A hardware Trojan detection example is illustrated for the ISCAS85 c17 benchmark circuitBack to article page