The new version of the Enhanced Mitigation Experience Toolkit (EMET) 4.0 has been released in beta. EMET uses the necessary preventive methods to protect applications from various kinds of attack, which are aimed at exploiting flaws in the software and changing the code execution flow. EMET helps protect applications, including from 0day exploits that can use 
ROP to bypass DEP and ASLR . The new version of EMET introduces a number of additional features that allow you to detect various scenarios of exploitation and application compromise.

Downloadable distributive can be downloaded 
here . To install EMET .NET Framework 4 is required.
')
New 
features v4.
SSL / TLS Certificate Trust featuresAdditional features for managing SSL / TLS certificates for the Internet Explorer browser and creating special rules. The ability to detect an attack of the MITM type (Man in the middle) when using third-party certificates (the ability to filter Root CA certificates based on the Key Size, Allowed Country options).
Strengthened mitigations, blocking bypassesIncludes new exploit blocking features that use new varieties of ROP (anti-EMET). In particular, several new handlers were added for the 
kernelbase! VirtualAlloc and 
ntdll! NtAllocateVirtualMemory functions , without which ROP mitigation could be circumvented. The “Banned API” feature allows you to block DEP, ASLR bypass techniques using 
ntdll! LdrHotPatchRoutine .
Audit ModeAllows you to disable the ability to complete the EMET-controlled process in which an operation attempt was detected (by default).

More information on EMET settings and their decoding 
here (v3.5).
The official release of EMET v4.0 is expected on May 14, 2013.