Return to Article Details On the Difficulty of FSM-based Hardware Obfuscation Download Download PDF