Skip to main content

Table 6 Influence of deleting path 4

From: A security method of hardware Trojan detection using path tracking algorithm

Path

 

Intersection

1

1→5

1

2

2→3→5

2

3

2→3→6

2

4

2→4→6

0

5

3→5

1

6

3→6

1

7

4→6

0