If humans were identical clones like software is today, then any virus could have caused our extinction. Polymorphing for Linux immunizes your entire software stack through continuous binary diversity.
Memory-based attacks take aim at specific function locations, CPU registers, and other targets. Polyverse randomly changes all of these targeting details at the binary level. We take source code and run it through a polymorphic compiler, changing register usage, function locations, import tables, and so on to produce individually unique binaries that are semantically equivalent.
We then take the compiler and apply it to the totality of the Linux stack. These binaries are delivered through a standard package repository for your favorite version of Linux. Simply add Polyverse to the front of your mirror list, and then you're protected.
See what weaknesses Polymorphing for Linux mitigates in our Weakness Report.
Access a uniquely randomized set of binaries for the full Linux stack. Deployment is simple, taking less than 5 minutes.
Many zero-day attacks exploit memory vulnerabilities. Of the 7,217 CVEs in 2017 of high or medium severity, a stunning 80% involved memory exploitation. Polymorphing for Linux is immune to these types of attacks. Use our free Entropy Visualizer to see this in action.
Polyscripting changes the grammar of a programming language by scrambling the keywords used during lexical analysis.
Reduce attackers’ windows of opportunity by increasing their uncertainty. By harnessing Moving-Target Defense (MTD), Polyverse creates strategic entropy in software systems.