Defeating Hardware Trojan through Software Obfuscation