From: A security method of hardware Trojan detection using path tracking algorithm
Benchmark | Wire coverage delay | Net coverage delay |
---|---|---|
c17 | 4 | 6 |
c432 | 36 | 81 |
c499 | 41 | 107 |
c880 | 95 | 130 |
c1355 | 72 | 208 |
c1908 | 72 | 78 |
c2670 | 168 | 298 |
c3540 | 104 | 297 |
c5315 | 383 | 508 |
c6288 | 77 | 104 |
c7552 | 303 | 309 |