ljknews wrote:
> Analyzing source code is independent of machine architecture.
> 
> My guess is that if a company actually is capable of analyzing
> binary code they only do it for the highest volume instruction
> sets.
> 
> My guess is that attackers will go after machines they feel are
> less protected.
> 
> Efforts which merely change attacker behavior are a waste of time.

Nope. If I'm running x86 boxes, I'd be more than happy to have to
attackers move to SPARC.

Besides, once a bug is found in the x86 binary, the problem gets fixed
in the source and/or compiler.

                                        BB
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to