@INPROCEEDINGS{4681649, author={Chakraborty, R.S. and Bhunia, S.}, booktitle={Computer-Aided Design, 2008. ICCAD 2008. IEEE/ACM International Conference on}, title={Hardware protection and authentication through netlist level obfuscation}, year={2008}, pages={674-677}, keywords={authorisation;benchmark testing;industrial property;system-on-chip;IP vendors;ISCAS-89 benchmark circuits;hardware IP protection;hardware intellectual property cores;netlist level authentication;netlist level obfuscation;system-on-chip;Authentication;Circuit simulation;Delay;Design methodology;Hardware;Intellectual property;Manufacturing;Protection;Security;System-on-a-chip;Design for security;IP piracy;hardware authentication;hardware obfuscation;hardware protection}, doi={10.1109/ICCAD.2008.4681649}, ISSN={1092-3152},}