Skip to main content

Table 6 Influence of deleting path 4

From: A security method of hardware Trojan detection using path tracking algorithm

Path   Intersection
1 1→5 1
2 2→3→5 2
3 2→3→6 2
4 2→4→6 0
5 3→5 1
6 3→6 1
7 4→6 0