Delivers drop-in, scrambled versions of Linux for zero-day protection
Polyverse utilizes ground-breaking moving-target defense technologies to protect systems from crafted attacks. We work with existing security systems to provide comprehensive zero-day protection, and more.
So How Does It Work?
Memory-based attacks work by targeting specific function locations, CPU registers, among others. Polyverse randomly changes all of these targeting details at the binary level. We take source code and run it through a polymorphic compiler, changing register usage, function locations, import tables, and so on to produce individually unique binaries that are semantically equivalent.
We then take the compiler and apply it to the totality of the Linux stack. These binaries are delivered through a standard package repository for your favorite version of Linux. Simply add Polyverse to the front of your mirror list, and then you're protected!
Many zero-day attacks exploit memory vulnerabilities. Of the 7,217 CVEs in 2017 of high or medium severity, a stunning 80% involve memory exploitation.
Polyverse Polymorphic Linux is immune to these types of attacks. Use our free Entropy Visualizer to see this in action.
Polymorphic Linux Stops Attacks, Not Just Alert When One is Occurring
Access a uniquely randomized set of binaries for the full Linux stack. Deployment is simple, taking less than 5 minutes.
Reduce attackers windows of opportunity by increasing their uncertainty. By harnessing Moving-Target Defense (MTD), Polyverse creates strategic entropy in software systems.
Eliminate Code Injection with Polyscripting
Polyscripting changes the grammar of a programming languages by scrambling the keywords used during lexical analysis.