AI is getting scary good at finding hidden software bugs - even in decades-old code
Briefly

AI is getting scary good at finding hidden software bugs - even in decades-old code
"Claude didn't just explain the code; it performed what he called a "security audit," surfacing subtle logic errors, including one case where a routine failed to check the carry flag after an arithmetic operation. That's a classic bug that had been hiding, dormant, for decades."
"Oh, my, am I seeing this right? The attack surface just expanded to include every compiled binary ever shipped. When AI can reverse-engineer 40-year-old, obscure architectures this well, current obfuscation and security-through-obscurity approaches are essentially worthless."
"On the one hand, AI will help us find bugs so we can fix them. That's the good news. On the other hand, and here's the bad news, AI can also break into programs still in use that are no longer be"
Microsoft Azure CTO Mark Russinovich demonstrated that Claude Opus 4.6 successfully analyzed 1986 assembly code for the Apple II processor, identifying subtle logic errors including a carry flag bug dormant for decades. While this showcases AI's potential to find defects in long-lived codebases that conventional tools miss, security experts warn of significant risks. The same AI capability that helps developers discover and fix bugs can be weaponized by attackers to reverse-engineer obscure architectures and exploit vulnerabilities in deployed systems. This dual-use nature means current obfuscation and security-through-obscurity approaches are becoming ineffective, expanding the attack surface to include every compiled binary ever shipped.
Read at ZDNET
Unable to calculate read time
[
|
]