Skip to main content

Table 4 Chosen paths

From: A security method of hardware Trojan detection using path tracking algorithm

Path Intersection  
2 2 2→3→5
3 2 2→3→6
4 2 2→4→6