Fig. 3.From: A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug AttacksCircuit and corresponding timing graph.Back to paper page