Effective resistance to intellectual property theft, reverse engineering, and hardware Trojan insertion in integrated circuit supply chains is increasingly essential, for which many solutions have been proposed. Accordingly, strong attacks are also designed this field. One way achieve the above goal obfuscation. The obfuscation method hides primary function of normal Netlist from attacker by ad...