From: A security method of hardware Trojan detection using path tracking algorithm
Path
Intersection
1
1→5
2
2→3→5
3
2→3→6
4
2→4→6
0
5
3→5
6
3→6
7
4→6