Your SlideShare is downloading. ×
The Rise of X-Morphic Exploitation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

The Rise of X-Morphic Exploitation

556
views

Published on

Imagine different exploit code for every user's browser. Subscription-based exploit services. Exploits that are invulnerable to signature-based anti-virus software. X-morphic exploitation may create …

Imagine different exploit code for every user's browser. Subscription-based exploit services. Exploits that are invulnerable to signature-based anti-virus software. X-morphic exploitation may create such a hacker's paradise. Learn about this rising threat and how to combine signature- and behavior-based techniques to fight it.

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
556
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The Rise of X-Morphic Exploitation Gunter Ollmann Director of Security Strategy IBM Internet Security Systems Gunter Ollmann The Rise of X-Morphic Exploitation 11:00am, 27th April 2008
  • 2. Abstract • Imagine it: different exploit code for every user’s browser. Subscription-based managed exploit services. Exploits that are invulnerable to signature-based anti-virus software. X f X-morphic exploitation may hi l i i create such a hacker’s paradise. Learn about this rising threat and how to combine signature- and behavior-based techniques to fight it. q g Gunter Ollmann The Rise of X-Morphic Exploitation 11:00am, 27th April 2008