sorry to bother you, but how can we prove the functionality of code before and after code obfuscation?