State of the Art Memory Protection
ROP and Blind ROP protection
Many advanced cyber attacks rely on subverting and controlling an application in memory while it is running. These attacks can be extremely difficult for conventional cybersecurity techniques to detect and defend.
PolyX continuously changes an applications memory layout--while it is running. Code is dynamically moved and modified, mitigating even the most sophisticated attacks.
PolyX runs as an agent for Linux applications. As part of layered cyber defense strategy, PolyX can amplify the protection for Internet facing services, honeypots, and other services exposed to hostile actors.
Learn more about PolyX
What it does, when to use it, installation guide, tips and more...