The Rise of X-Morphic Exploitation

790 views

Published on

Imagine different exploit code for every user's browser. Subscription-based exploit services. Exploits that are invulnerable to signature-based anti-virus software. X-morphic exploitation may create such a hacker's paradise. Learn about this rising threat and how to combine signature- and behavior-based techniques to fight it.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
790
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Rise of X-Morphic Exploitation

  1. 1. The Rise of X-Morphic Exploitation Gunter Ollmann Director of Security Strategy IBM Internet Security Systems Gunter Ollmann The Rise of X-Morphic Exploitation 11:00am, 27th April 2008
  2. 2. Abstract • Imagine it: different exploit code for every user’s browser. Subscription-based managed exploit services. Exploits that are invulnerable to signature-based anti-virus software. X f X-morphic exploitation may hi l i i create such a hacker’s paradise. Learn about this rising threat and how to combine signature- and behavior-based techniques to fight it. q g Gunter Ollmann The Rise of X-Morphic Exploitation 11:00am, 27th April 2008

×