From: A security method of hardware Trojan detection using path tracking algorithm
Edge
Path Number
1
1→5
2
2→3
3
2→4
4
3→5
5
3→6
6
4→6