We developed Chiplock to detect when exploits are used regardless of how a system is constructed. Chiplock detects attacks on OT and IOT systems, on Kubernetes applications, on cloud servers, on traditional servers and everything else in between. The solution is patent pending. Chiplock is not a replacement for other security solutions, it is a complement to them, providing visibility where current solutions don't. Chiplock can also be added to an application's code base making Chiplock part of the app itself.
Chiplock is lightweight, requiring less than 50k of space in memory to run. It is compatible with any platform or OS and has a flexible deployment model.
Our current efforts are focused on developing a delivery package and APIs to allow customers to use our products as either a standalone application, embedded in another application, or integrated into their current cybersecurity architecture.
UPDATE: We have added audio to the demonstration videos below showing Chiplock in action. Be sure to signup at the link below to receive updates!
Chiplock Demo Videos
Video 1 shows a ROP chain exploit run successfully against a docker containerized application that is detected by Chiplock from the host level. This could also apply to zero knowledge architectures or shielded VMs
Video 2 shows Chiplock detecting an exploit run against an application in a VMware virtual machine from the host operating system without any tooling inside the VM.
Image Credit
Image by <a href="https://www.freepik.com/free-photo/people-voting-while-sharing-ideas_1267946.htm#query=vote&position=0&from_view=search&track=sph">Freepik</a>