Piercing Logic Locking Keys through Redundancy Identification | IEEE Conference Publication | IEEE Xplore