Determine the correct key for the logic encrypted circuit below in Fig. 14.12 (in other words, what key makes x = x’ and y = y’). Explain your answer.
1. Describe the vulnerabilities in each step of the supply chain of an IC.
2. Briefly describe the possible obfuscation-based solutions for countering hardware IP piracy at each step of the supply chain.