Analyzing The Security Gap In Bootstrapping Obfuscation