I can attest to at least one case where AT&T attempted to see whether its Unix code had been stolen. A Unix look-alike came to AT&T's attention, and they wanted to get a sense of whether the code had been copied before bringing out the big legal guns. I was one of several people asked to log into the system and see what I could figure out. They particularly wanted me to look at their Yacc, because they assumed that would be hard to duplicate.
So I spent an interesting hour checking it out. The first thing I did was to look to see whether some of my bugs or unadvertised features were in the program, and they weren't. Then I threw a couple of difficult cases at it, and found a couple of bugs in their code. And besides, it was VERY slow. So I concluded it was a reimplementation. I gather that was the consensus of others as well, and AT&T backed off.
Steve