Skip to main content

Table 5 Connections between inputs and nodes

From: A security method of hardware Trojan detection using path tracking algorithm

Input Gate
1 1
2 3
3 1, 2
6 2
7 4