This document summarizes a research paper that analyzes the security of obfuscating a circuit's clock signal. It describes how the clock signal can be obfuscated through techniques like using internal programmable clock sources or varying the clock frequency through rational or irrational multiples of a base period. It also discusses approaches for deobfuscating clock-ambiguous circuits through techniques like sequential model checking and identifying the base clock period. Experimental results on ISCAS benchmarks showed that clock obfuscation provides a similar level of security as traditional logic locking with XOR/XNOR insertion.