RunSafe Security Alkemist
Immunize Software from Cyber Attacks.
Overview
RunSafe Security's Alkemist is a platform that immunizes software from memory-based cyberattacks without requiring access to source code. It uses patented techniques, including Load-time Function Randomization (LFR) and stack randomization, to transform binaries. This transformation makes it virtually impossible for attackers to use memory corruption vulnerabilities to gain control of a device, as the memory layout is unique for each device. It's a preventative approach that neutralizes an entire class of attacks.
✨ Key Features
- Binary Stirring and Randomization
- Load-time Function Randomization (LFR)
- Memory Corruption Exploit Prevention
- No Source Code Required
- Protection for Open Source and Third-Party Code
- Integration with Build Systems (Yocto, Buildroot)
🎯 Key Differentiators
- Patented binary stirring and load-time randomization techniques.
- Focus on making exploits non-portable and economically unfeasible for attackers.
- Works on compiled binaries without needing source code or special compilers.
Unique Value: Dramatically increases the cost and difficulty for attackers to exploit memory vulnerabilities, effectively immunizing software from an entire class of threats without impacting performance or requiring source code changes.
🎯 Use Cases (4)
✅ Best For
- Securing firmware for industrial control systems.
- Protecting networking infrastructure devices.
- Hardening software for military and defense applications.
💡 Check With Vendor
Verify these considerations match your specific requirements:
- Organizations needing network visibility and threat detection.
- Security for web applications or mobile apps.
🏆 Alternatives
Unlike CFI solutions that validate program flow, RunSafe's randomization approach focuses on disrupting the attacker's ability to predict memory layouts, offering a different but complementary form of preventative protection.
💻 Platforms
✅ Offline Mode Available
🔌 Integrations
🛟 Support Options
- ✓ Email Support
- ✓ Phone Support
- ✓ Dedicated Support (Enterprise tier)
💰 Pricing
✓ 14-day free trial
🔄 Similar Tools in Firmware Security
Dragos Platform
OT-native cybersecurity platform for asset visibility, threat detection, and vulnerability managemen...
Microsoft Defender for IoT
A unified security solution from Microsoft to identify and secure IoT and OT devices, vulnerabilitie...
Finite State
A product security platform for connected devices, focusing on firmware analysis and software supply...
JFrog Xray
An SCA tool that identifies security vulnerabilities and license compliance issues in open source an...
Cybellum
A product security platform for device manufacturers to manage vulnerabilities, SBOMs, and complianc...
Timesys Vigiles
A Software Composition Analysis (SCA) and CVE monitoring tool designed for embedded Linux and open-s...