A good exploit is one that is delivered in style”. My work over the past couple of years involves exploring new and innovative means of exploit delivery. My research involves using perfectly valid images (JPG, GIF, BMP, etc) to not only deliver exploits but also trigger them.
Exploit delivery therefore happens through transmission of pure images. No known means of malware detection have been able to successfully identify these images.