From: A security method of hardware Trojan detection using path tracking algorithm
Input
Gate
1
2
3
1, 2
7
4