Secure Coding mailing list archives

Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis


From: mouse at Rodents.Montreal.QC.CA (der Mouse)
Date: Thu, 25 Jan 2007 15:45:15 -0500 (EST)

Opinions on binary vs. source code (and design!) analysis, anyone?
Analyzing source code is independent of machine architecture.

Only if the code is (supposed to be) architecture-independent.  If the
code is deliberately architecture-dependent, static analysis needs to
know that, and know which the salient properties of its target
architecture(s) is(are), in order to do a proper job.

Efforts which merely change attacker behavior are a waste of time.

I disagree.  It depends on the effort required to provoke the change,
the change in attacker behaviour, and the tradeoffs involved in the
threat model.  To pick a historic example, fixing the "rlogin -l
-froot" bug "merely" changed attacker behaviour to password guessing,
but in most environments it was nevertheless a win.

/~\ The ASCII                           der Mouse
\ / Ribbon Campaign
 X  Against HTML               mouse at rodents.montreal.qc.ca
/ \ Email!           7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B


Current thread: