Skip to main content

Table 4 Chosen paths

From: A security method of hardware Trojan detection using path tracking algorithm

Path

Intersection

 

2

2

2→3→5

3

2

2→3→6

4

2

2→4→6