The document discusses detecting "certified pre-owned" software, or software containing backdoors. It describes how static analysis of software binaries can detect various types of application backdoors, including special credentials, unintended network activity, and deliberate information leakage. The document focuses on detecting indicators that software is trying to hide its behavior, such as rootkit behavior and anti-debugging techniques, through static analysis of the software code. Rules can be developed for static analyzers to inspect software for these types of backdoor behaviors and indicators.