This book demonstrates the breadth and depth of IP protection through logic locking, considering both attacker / adversary and defender / designer perspectives. The authors draw a semi-chronological picture of the evolution of logic locking during the last decade, gathering and describing all the DO s and DON Ts in this approach. They describe simple-to-follow scenarios and guide readers to navigate / identify threat models and design / evaluation flow for further studies. Readers will gain a comprehensive understanding of all fundamentals of logic locking.