Revisit sequential logic obfuscation: Attacks and defenses | IEEE Conference Publication | IEEE Xplore