Imagine different exploit code for every user's browser. Subscription-based exploit services. Exploits that are invulnerable to signature-based anti-virus software. X-morphic exploitation may create such a hacker's paradise. Learn about this rising threat and how to combine signature- and behavior-based techniques to fight it.
Apidays New York 2024 - The value of a flexible API Management solution for O...
The Rise of X-Morphic Exploitation
1. The Rise of X-Morphic
Exploitation
Gunter Ollmann
Director of Security Strategy
IBM Internet Security Systems
Gunter Ollmann
The Rise of X-Morphic Exploitation
11:00am, 27th April 2008
2. Abstract
• Imagine it: different exploit code for every
user’s browser. Subscription-based
managed exploit services. Exploits that are
invulnerable to signature-based anti-virus
software. X
f X-morphic exploitation may
hi l i i
create such a hacker’s paradise. Learn
about this rising threat and how to
combine signature- and behavior-based
techniques to fight it.
q g
Gunter Ollmann
The Rise of X-Morphic Exploitation
11:00am, 27th April 2008