Resource Center

Case Study
case study image
This paper demonstrates how to integrate Polymorphic Linux into a GitHub project, giving your projects powerful yet simple security protection.
Documentation
alpine polymorphic linux installation
Learn how to install Polymorphic Linux® for Alpine Linux v3.6, v3.7, v3.8, and v3.9 on a variety of scenarios.
Documentation
centos polymorphic linux installation
Learn how to install Polymorphic Linux for CentOS v6 and v7 on a variety of scenarios.
Documentation
fedora polymorphic linux installation
Learn how to install Polymorphic Linux for Fedora v23, v24, and v25 on a variety of scenarios.
Documentation
redhat polymorphic linux installation
Learn how to install Polymorphic Linux for Red Hat v6 and v7 on a variety of scenarios.
Documentation
ubuntu polymorphic linux installation
Learn how to install Polymorphic Linux for Ubuntu Xenial and Bionic on a variety of scenarios.
Video
how polymorphic linux works video
If all humans were identical clones, any simple virus would have led to our extinction. This is precisely what happens to computers today. Polyverse adds diversity to your operating systems and stops memory based attacks.
Research
451 research case study
451 Research data shows a shortage of IT administration and networking skills across technologies. Newer approaches, such as Moving Target Defense, can embed security in the IT infrastructure and result in significant gains in time, skills and resources.
Whitepaper
polyscript whitepaper
Polyscripting scrambles the programming language so hackers are unable to inject any malicious code.
Case Study
microfocus whitepaper
Securing your security information and event management (SIEM) software with polymorphic Moving Target Defense (MTD) technology.
Whitepaper
moving target defense whitepaper
A resilient system is one where breach is assumed, but has defenses designed such that the system can continue to operate safely and reliably.
Video
get to know polyverse
In this video CEO, Alex Gounares, explains the origins of Polymorphic Linux and why it is important for software to be dynamic and unique.
Video
Understanding Spectre: Part 1
Morgan Hein describes in detail what the Spectre vulnerability is, how it works and why it is effective against every chip made in the last two decades.
Whitepaper
Polyverse Product Brief
Polymorphic Linux uses Moving-Target Defense to strategically randomize memory layouts of the target application to stop memory exploitation attacks.
Video
What Startups Should Know about Security
Methods to effectively create execution plans that have a finite cost, are realistic, provide a tangible measurable benefit, are cheap, and cover your bases with customers, investors, and regulators.
Video
How Does Polymorphic Linux Work?
Kiley Williams goes from explaining how to craft a memory-based attack, into how to thwart it, and what a real-world application of Polymorphic Linux looks like.
Research
Survey of Cyber Moving Targets, Second Edition
This report conducted by MIT Lincoln Laboratory provides an overview of cyber Moving Target Defense strategies.
Video
envisen
Morgan Hein discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually-rich and purposeful way.
Case Study
ISACA Polyverse Case Study
This study conclusively demonstrated the resiliency of Polyverse’s Moving-Target Defense technology against web-application and remote-code exploit attacks.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.