[1]
“On the Difficulty of FSM-based Hardware Obfuscation”, TCHES, vol. 2018, no. 3, pp. 293–330, Aug. 2018, doi: 10.13154/tches.v2018.i3.293-330.