One of the working hypothesis is that the attacker already own the HW.That's not how it works. Let's we plan to do something bad - it doesn't matter what - but the plan involve to destroy your car. You tell me that the cost is not worth it, because your car is valuable to you. What would think if I answered you "it doesn't matter what the cost of the car is, because you are an existing car owner, you already have the car".
In this scenario the attacker want to destroy the value of the big block branch not the entire net work.The difference include:
- Unrealized benefits
- If the network is effectively destroyed, the devaluation of assets - an ASIC is just an overly expensive and noisy piece of heating equipment if there is no coin to mine.
So even in the case the attacker is going to buy a bunch of new shiny S9, he could still use them on the his chain after the attack.
That said you could add a column with the HW cost, which will be a function of the hashrate used in the attack and share the result with us.