Vulnerability Trends
Exploit tools more sophisticated
Flaws can be found without source
- common: system call trace
- new: subroutine call trace
Good news — the public & vendors becoming more security conscious
Patches now being released via Internet
Still untested — product liability