@INPROCEEDINGS{5224963, author={Chakraborty, R.S. and Bhunia, S.}, booktitle={Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on}, title={Security through obscurity: An approach for protecting Register Transfer Level hardware IP}, year={2009}, pages={96-99}, keywords={industrial property;integrated circuit design;reverse engineering;security of data;system-on-chip;watermarking;IP piracy;bug-free hardware intellectual property cores;correct initialization sequence;key-based security;register transfer level description;register transfer level hardware IP;reverse engineering;system-on-chip designs;technology-independent gate-level description;watermarking techniques;Computer security;Cryptography;Design methodology;Hardware design languages;Open source software;Protection;Registers;Reverse engineering;System-on-a-chip;Watermarking;Hardware IP Protection;IP piracy;RTL obfuscation}, doi={10.1109/HST.2009.5224963},}