The Software IP Detective's Handbook : Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook : Measurement, Comparison, and Infringement Detection
Click to enlarge
Author(s): Zeidman, Bob
ISBN No.: 9780137035335
Edition: Revised
Pages: 480
Year: 201104
Format: Trade Paper
Price: $ 78.17
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface xxi Acknowledgments xxiii About the Author xxv P art I: I ntroduction 1 Objectives 2 Intended Audience 2 Chapter 1: About this Book 5 Part I: Introduction 6 Part II: Software 6 Part III: Intellectual Property 6 Part IV: Source Code Differentiation 9 Part V: Source Code Correlation 9 Part VI: Object and Source/Object Code Correlation 10 Part VII: Source Code Cross-Correlation 10 Part VIII: Detecting Software IP Theft and Infringement 11 Part IX: Miscellaneous Topics 11 Part X: Past, Present, and Future 11 Chapter 2: Intellectual Property Crime 13 2.1 The Extent of IP Theft 14 P art II: S oftware 21 Objectives 22 Intended Audience 22 Chapter 3: Source Code 23 3.1 Programming Languages 24 3.2 Functions, Methods, Procedures, Routines, and Subroutines 26 3.3 Files 32 3.4 Programs 35 3.5 Executing Source Code 36 Chapter 4: Object Code and Assembly Code 39 4.1 Object Code 39 4.


2 Assembly Code 40 4.3 Files 43 4.4 Programs 44 Chapter 5: Scripts, Intermediate Code, Macros, and Synthesis Primitives 45 5.1 Scripts 45 5.2 Intermediate Code 47 5.3 Macros 48 5.4 Synthesis Primitives 49 P art III: I ntellectual P roperty 53 Objectives 55 Intended Audience 55 Chapter 6: Copyrights 57 6.1 The History of Copyrights 57 6.


2 Copyright Protections 60 6.3 Software Copyrights 63 6.4 Allowable and Nonallowable Uses of Copyrighted Code 72 Chapter 7: Patents 79 7.1 The History of Patents 80 7.2 Types of Patents 81 7.3 Parts of a Patent 82 7.4 Patenting an Invention 85 7.5 Special Types of Patent Applications 86 7.


6 Software Patents 90 7.7 Software Patent Controversy 91 7.8 Patent Infringement 95 7.9 NPEs and Trolls 99 Chapter 8: Trade Secrets 103 8.1 The History of Trade Secrets 103 8.2 Uniform Trade Secrets Act (UTSA) 104 8.3 Economic Espionage Act 105 8.4 Aspects of a Trade Secret 106 8.


5 Trade Secret Theft 111 8.6 Patent or Trade Secret? 112 Chapter 9: Software Forensics 113 9.1 Forensic Science 115 9.2 Forensic Engineering 116 9.3 Digital Forensics 119 9.4 Software Forensics 120 9.5 Thoughts on Requirements for Testifying 121 P art IV: S ource C ode D ifferentiation 125 Objectives 126 Intended Audience 126 Chapter 10: Theory 127 10.1 Diff 128 10.


2 Differentiation 133 10.3 Types of Similarity 135 10.4 Measuring Similar Lines 136 10.5 Measuring File Similarity 140 10.6 Measuring Similar Programs 142 Chapter 11: Implementation 147 11.1 Creating and Comparing Arrays 147 11.2 Number of Optimal Match Score Combinations 151 11.3 Choosing Optimal Match Scores for Calculating File Similarity 153 11.


4 Choosing File Similarity Scores for Reporting Program Similarity 161 Chapter 12: Applications 165 12.1 Finding Similar Code 165 12.2 Measuring Source Code Evolution 168 P art V: S ource C ode C orrelation 183 Objectives 185 Intended Audience 185 Chapter 13: Software Plagiarism Detection 187 13.1 The History of Plagiarism Detection 187 13.2 Problems with Previous Algorithms 189 13.3 Requirements for Good Algorithms 192 Chapter 14: Source Code Characterization 197 14.1 Statements 199 14.2 Comments 206 14.


3 Strings 207 Chapter 15: Theory 209 15.1 Practical Definition 210 15.2 Comparing Different Programming Languages 213 15.3 Mathematical Definitions 214 15.4 Source Code Correlation Mathematics 215 15.5 Source Code Examples 216 15.6 Unique Elements 218 15.7 Statement Correlation 219 15.


8 Comment/String Correlation 223 15.9 Identifier Correlation 225 15.10 Instruction Sequence Correlation 227 15.11 Overall Correlation 228 Chapter 16: Implementation 233 16.1 Creating Arrays from Source Code 234 16.2 Statement Correlation 239 16.3 Comment/String Correlation 240 16.4 Identifier Correlation 241 16.


5 Instruction Sequence Correlation 243 16.6 Overall Correlation 245 16.7 Comparing Programs in Different Programming Languages 246 16.8 Comparing Sections of Code Other than Files 246 Chapter 17: Applications 247 17.1 Functional Correlation 248 17.2 Identifying Authorship 249 17.3 Identifying Origin 251 17.4 Detecting Copyright Infringement (Plagiarism) 252 17.


5 Detecting Trade Secret Theft 252 17.6 Locating Third-Party Code (Open Source) 253 17.7 Compiler Optimization 254 17.8 Refactoring 254 17.9 Detecting Patent Infringement 255 P art VI: O bject and S ource /O bject C ode C orrelation 257 Objectives 258 Intended Audience 259 Chapter 18: Theory 261 18.1 Practical Definition 266 18.2 Extracting Elements 268 18.3 Comparing Different Programming Languages 270 18.


4 Mathematical Definitions 270 18.5 Object and Source/Object Code Correlation Mathematics 272 18.6 Comment/String Correlation 273 18.7 Identifier Correlation 274 18.8 Overall Correlation 275 18.9 False Negatives 276 Chapter 19: Implementation 279 19.1 Creating Text Substring Arrays from Object Code 279 19.2 Creating Arrays from Source Code 283 19.


3 Identifier Correlation 287 19.4 Comment/String Correlation 287 19.5 Overall Correlation 287

To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...