Secure Coding mailing list archives

Managing the insider threat through code obfuscation


From: Ken at krvw.com (Kenneth R. van Wyk)
Date: Thu, 15 Dec 2005 10:09:08 -0500

On Thursday 15 December 2005 09:26, Jose Nazario wrote:
if the person can develop exploits against the holes in the code, what
makes you think they can't fire up a runtime debugger and trace the code
execution and discover the same things?

Nothing makes me think that at all; in fact, I was quite skeptical of the 
various product claims, which is why I wanted to hear about others' 
experience with them.

Cheers,

Ken
-- 
KRvW Associates, LLC
http://www.KRvW.com



Current thread: