Designing Effective Logic Obfuscation: Exploring Beyond Gate-Level Boundaries