How It Works

RunSafe Security’s proprietary cyberhardening technology reduces the vulnerability attack surface that attackers most commonly use to compromise operations processes, Internet of Things (IoT) devices, vehicles, medical devices, and components of industrial control systems in power plants and utilities.

How Cyberhardening Works

RunSafe Security’s technology hardens binaries (files and programs) against memory corruption errors and buffer overflow exploits – the techniques attackers typically use to gain control of embedded systems and devices. Our remotely deployable cyberhardening transformation process utilizes two runtime application self-protection (RASP) techniques.

  • The first is block-level binary stirring (randomization) that makes each protected system and device functionally identical but logically unique.
  • The second is control flow integrity (CFI), which protects against Return Oriented Programming (ROP) attacks, in which existing code is called out of order to become a hacking script. This prevents malware from changing how commands are executed and denies it the uniformity required to propagate.

By precluding an exploit from spreading across multiple devices and networks, RunSafe Security disrupts hacker economics and shifts the odds in favor of the defender. While other security solutions focus on preventing breaches with firewalls, anti-virus software, and intrusion protection, RunSafe assumes that hackers will eventually break in. Therefore, rather than reacting to compromised vulnerabilities following an exploit, our solution proactively prevents malware from being executed in the first place.

Read how we disrupt the traditional economics of cyberattacks and deny both routine and advanced techniques of attackers.