Revisit and Challenge on Program Obfuscation with Provable Virtual Black-box Security