RESEARCH PROJECT
Firethorn Logo Red

Firethorn™ uses revolutionary side-channel analysis and machine learning to detect ransomware in milliseconds

How it worksRead the Performance Whitepaper
Firethorn Icon
~ 98%
Detection Accuracy
<5 ms
Detection speed
< 1 %
CPU Overhead
Patent Protected
Spearheading side-channel analysis
OUR INNOVATION

A fundamentally different approach

Firethorn doesn't watch files or look for known signatures. Instead, it analyzes physical side-effects that ransomware produce at the hardware level.

What is side-channel analysis?

When ransomware encrypts files, it creates distinctive patterns in hardware telemetry that can't be masked or evaded:

  • CPU, memory, disk behavior changes dramatically
  • Memory/Disk access patterns become highly predictable
  • Power consumption exhibits unique signatures
  • Anomolies are registered in non-conventional patterns

These hardware-level artifacts exist because of the fundamental mathematics of encryption. They can't be hidden without making the ransomware non-functional

Firethorn detects the physics of ransomware, not just the signature based behavior of malware.

Machine learning + hardware telemetry

Our patented approach combines real-time hardware performance counters across multiple architectures with trained ML models to identity ransomware activity.

  • Kernel level sensors collect hardware telemetry without application-level hooks.
  • ML samples trained on thousands of ransomware samples, variations of ransomware behavior, and known good states.
  • Sub-millisecond detection from the moment encryption begins.

Because we're analyzing hardware signatures rather than software behaviors, we can drill deep into common ransomware and detect zero-days that are not based on signatures or application level behaviorial rules.

Detection happens with near-zero CPU overhead.

Built for real-world deployment.

READ THE FULL WHITEPAPER

Progress and Development

Firethorn's detection capabilities are well-developed and undergoing continuous refinement with select partners. Our core technology has proven its effectiveness — now we're perfecting the full product experience.

As we perfect this core functionality, our focus shifts to the next phase: implementing mitigation and response techniques. These additions will transform Firethorn into an all-in-one, fully autonomous solution designed to thwart ransomware attacks. Even with these advancements, Firethorn remains the lightest and most efficient platform on the market.

While Firethorn is not yet commercially available, we're actively working toward production release. Organizations interested in early access or partnership opportunities are encouraged to reach out.

Interested in partnering for ransomware detection?

Schedule a call with our team to discuss how Firethorn and our other solutions and services can help secure your business today

Let's chat