- Part I: Introduction
- Part II: Software
- Part III: Intellectual Property
- Part IV: Source Code Differentiation
- Part V: Source Code Correlation
- Part VI: Object and Source/Object Code Correlation
- Part VII: Source Code Cross-Correlation
- Part VIII: Detecting Software IP Theft and Infringement
- Part IX: Miscellaneous Topics
- Part X: Past, Present, and Future
Part VIII: Detecting Software IP Theft and Infringement
All of the correlation measures described in previous parts are useful for detecting software intellectual property theft; however, expert review is still required. Previously developed algorithms often produced a measure that claimed to show whether code was copied or not. In reality, a mathematical measure in and of itself is not enough to make this determination, and that is one of the problems with previous work in this area. In this Part I describe detailed, precise steps to be taken once correlation has been calculated. These steps are as important to the standardization and objectivity required for determining intellectual property theft and infringement as are the various correlation measurements described in the previous parts.