Analyzing Browser Based Vulnerability Exploitation Incidents

I've written up a paper that describes some useful tools/techniques for deconstructing web based exploits:

Analyzing Browser Based Vulnerability Exploitation Incidents

The paper started as a blog entry and it remains a blog entry at its core. But since really huge blog entries are uncool (so I hear), and for other logistical reasons, the paper itself is hosted elsewhere. Future research from other members of my team will likely be collected in some central spot, stay tuned...