How Does It Work?
Polyverse utilizes ground-breaking moving-target defense technologies to protect systems from crafted attacks.
Memory-based attacks work by targeting specific function locations, CPU registers, among others. Polyverse randomly changes all of these targeting details at the binary level. We take source code and run it through a polymorphic compiler, changing register usage, function locations, import tables, and so on to produce individually unique binaries that are semantically equivalent.
We then take the compiler and apply it to the totality of the Linux stack. These binaries are delivered through a standard package repository for your favorite version of Linux. Simply add Polyverse to the front of your mirror list, and then you're protected!
Many zero-day attacks exploit memory vulnerabilities. Of the 7,217 CVEs in 2017 of high or medium severity, a stunning 80% involve memory exploitation. Polyverse’s polymorphic versions of Linux is immune to these types of attacks. Use our free Entropy Visualizer to see this in action.Analyze Binaries
Polyverse’s polymorphic versions of Linux Stop Attacks, Not Just Alert When One is Occurring
Access a uniquely randomized set of binaries for the full Linux stack. Deployment is simple, taking less than 5 minutes.Product Brief
Reduce attackers windows of opportunity by increasing their uncertainty. By harnessing Moving-Target Defense (MTD), Polyverse creates strategic entropy in software systems.Learn More
Eliminate Code Injection with Polyscripting
Polyscripting changes the grammar of a programming languages by scrambling the keywords used during lexical analysis.Learn More