How Does It Work?

Polyverse utilizes ground-breaking moving-target defense technologies to protect systems from crafted attacks.

The Technology

Memory-based attacks work by targeting specific function locations, CPU registers, among others. Polyverse randomly changes all of these targeting details at the binary level. We take source code and run it through a polymorphic compiler, changing register usage, function locations, import tables, and so on to produce individually unique binaries that are semantically equivalent.

We then take the compiler and apply it to the totality of the Linux stack. These binaries are delivered through a standard package repository for your favorite version of Linux. Simply add Polyverse to the front of your mirror list, and then you're protected!

moving target defense target image

Eliminate Zero-Days

Many zero-day attacks exploit memory vulnerabilities. Of the 7,217 CVEs in 2017 of high or medium severity, a stunning 80% involve memory exploitation. Polyverse’s polymorphic versions of Linux is immune to these types of attacks. Use our free Entropy Visualizer to see this in action.

Analyze Binaries

Polyverse’s polymorphic versions of Linux Stop Attacks, Not Just Alert When One is Occurring

Access a uniquely randomized set of binaries for the full Linux stack. Deployment is simple, taking less than 5 minutes.

Product Brief
after polyverse image
moving target defense image

Moving-Target Defense

Reduce attackers windows of opportunity by increasing their uncertainty. By harnessing Moving-Target Defense (MTD), Polyverse creates strategic entropy in software systems.

Learn More

Eliminate Code Injection with Polyscripting

Polyscripting changes the grammar of a programming languages by scrambling the keywords used during lexical analysis.

Learn More
before and after polyscripting
polyverse small logo

Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries