摘要: Software protection is one of the most important issues concerning computer practice. The problem to sell programs that can be executed by buyer, yet cannot duplicated and/or distributed him other users. There exist many heuristics and ad-hoc methods for protection, but as a whole did not receive theoretical treatment it deserves.In this paper, we make first steps towards theoretic software protection: First, distill formulate key learning about program from its execution. Second, present an efficient way executing (i.e. interpreter) such infeasible learn anything monitoring executions. A scheme protects against duplication follows.How efficiently execute without allowing adversary, execution, ? Current cryptographic techniques applied keep contents memory unknow throughout are applicable hiding access pattern. Hiding pattern essence our solution. We show how implement (on-line in "oblivious manner") t fetch instructions size m making less than t?m? actual accesses, every fixed ?>0.