A whole new type of cyber security software which takes full control over computer and never allow malicious programs to execute. INT-R boots up right after computer power-up and starts working on a memory space where OS can never access. Then, it monitors whole processes in CPU, OS and applications and detects and safely stops malicious processes. We know how attackers try to hack the computer system. By blocking all the paths, INT-R fully protects even from unknown threats.

INT-R Protection Model

It protects computer from any cyber attacks, in real-time.Malicious programs try to build its working environment by making invalid changes on CPU and OS, elevate privileges, and start new process to communicate with external server. These processes have all in common regardless the program is known or unknown. INT-R Protection Model monitors all the processes requested by programs at CPU instruction level, and only stops malicious process before its execution.

INT-R Surveillance Model

It works just like Protection Model, but it doesn’t stop program execution, and generates detailed logs. With this model, you can check whether your own custom applications interfere protection policies of INT-Φ, prior to install Protection Model.

INT-R Analysis Model

It generates more detailed logs than Surveillance Model. With this model, you can trace and analyze behavior of targeted (usually malicious) programs, or computer’s working status at very deep level.

INT-R Architecture

INT-R Loader/OS

After turning on the switch, INT-R starts up before Microsoft's OS, prepares the security environment including BIOS, CPU, OS, memory, driver, kernel driver API, Native API, 4bit, 8bit, 16bit, 32bit, 64bit, and activate PC protecting OS.


INT-R-R0VLL is a security check mechanism within Ring 0 of the CPU.It is generated at the same time while starting Kernel.As a result of analyzing the API (about 2,800) used by the Driver, rules are defined as to what is malicious or not in API usage.


INT-R R3VLL is a security check mechanism within Ring 3 of the CPU.It generates for every process.As a result of analyzing the API (about 400 pieces) at the time of Syscall (CPU instruction) by the application, the rule was defined as to what is malicious or not in API usage.


INT-Φ will be software suitable for introduction for special purpose machines while following the thought of INT-R.

Consulting Service

With our products and analysis capabilities, we provide you with review and advice on your computer systems against serious cyber attacks, mainly from endpoint security perspective.

Training Services

For our product deployment, we offer training programs for end users and system administrators. The programs cover our knowledge on security protection and usage of our products. Upon your request, we can offer advanced training programs for developers.