VIXERO.
Physics-based network defense. We build systems that detect adversaries by the thermodynamics of their traffic — not its contents. Zero payload inspection. Pure math.
The first PCAP scanner that cannot read your traffic.
Drop a packet capture. AegisScan extracts 6-dimensional flow physics at the browser edge — packet size, inter-arrival time, direction, TCP window, flags, payload ratio — and returns a thermodynamic threat report. Your payload bytes never leave your device.
- Privacy by architecture — payload stripped client-side before transmission
- 262μs inference — TVD-HL-SSM running on AWS g5.8xlarge
- VLESS Reality, GhostBear, AMOI morphing detection out of the box
- Honeypot leaderboard — community captures train Tier V corpus
Three products. One thesis.
AEGIS is the engine. AegisScan is the product. HBEE is the future. Everything Vixero ships derives from a single conviction — that network defense belongs in physics, not in bytes.
A firewall that measures what your packets are, not what they say. TVD-HL-SSM fuses hyperbolic Poincaré embeddings, liquid time-constants, and Shannon entropy detection into a single linear-time core — immune to byte-level morphing.
Drop a PCAP. Get a thermodynamic threat report. Payload bytes never leave your browser — only the 6D physics tensor ever touches our inference API. Free tier is live at vixdev.cloud/scan.
Where AEGIS models what the packets say, HBEE models what the humans do. A multi-agent LLM-driven sociotechnical simulator for insider threats, phishing cascades, and trust collapse — the other half of the defense equation.
Four pillars, one core.
The TVD-HL-SSM architecture discards the Euclidean payload-reading paradigm entirely. It operates on 6-dimensional continuous-time flow physics, projected into a non-Euclidean manifold, modulated by liquid time-constants, and scored by thermodynamic variance.
6D Flow Physics
Packet size. Inter-arrival time. Directionality. TCP window. Flag state. Payload ratio. No byte content — adversarial pre-padding is mathematically neutralized at the ingress layer.
Hyperbolic Projection
Botnet topologies branch exponentially. Euclidean embeddings distort. Projection onto the Poincaré disk 𝔻ⁿ accommodates hierarchical routing structures without gradient explosion.
Liquid Time-Constants
Neural state decays proportional to microsecond IAT variance. The continuous-time ODE captures thermodynamic jitter that stateless surrogates cannot synthesize — exposing automated morphing.
Thermodynamic Variance
Sequence-wide Shannon entropy of hidden states. Human traffic has natural stochastic decay. Automated evasion produces rigid structural patterns — detectable as thermodynamic anomalies.
Trained on reality.
AEGIS was not trained on synthetic lab data. 400GB across four threat tiers — from trans-Pacific backbone traffic to proprietary adversarial captures that exist nowhere else on earth.
Planetary Baselines
300M+ packets of trans-Pacific backbone traffic, corporate enterprise flows, encrypted DNS captures. Teaches the Thermodynamic Sensor what natural, stochastic human decay looks like at planetary scale.
IoT & Botnet Warfare
Hardware captures of IoT devices infected with Mirai and Okiru botnets. Historical C2 beaconing DNA. Teaches the SSM to recognize forced, robotic sequence timing.
APT & Zero-Day Vault
Seven-year in-the-wild archive: Emotet, ClickFix, Handala Wiper. Memory-resident rootkits and trojans. The radioactive material of the corpus.
Proprietary Evasion
VLESS Reality streams, GhostBear obfuscation, high-entropy VPN tunnels, AMOI adversarial morphing — traffic engineered to defeat classifiers, used to train the system that defeats it.
⚠ RAW PCAP CLOSED · 6D TENSORS GATED ON 🤗Proven in silicon.
Evaluated on the 20% holdout partition containing zero-day rootkits, VLESS Reality mimicry tunnels, and AMOI-morphed captures. Checkpoint locked at Epoch 10.
The benchmark gap.
What happens when the adversary fights back. Architectural comparison under identical adversarial conditions — not a product attack, a physics reality check.
| Capability | ET-BERT | Standard SSM | AEGIS TVD-HL-SSM |
|---|---|---|---|
| Adversarial Padding Resistance | ✗ Vulnerable | ✓ Immune | ✓ Immune |
| Temporal Morphing Resistance | — Not applicable | ✗ Susceptible | ✓ Resistant |
| Payload Inspection Required | ✓ Required | ✓ Required | ✗ Never |
| F1 Under Attack | 25.68% | ~85.00% | 99.52% |
| Inference Latency | ~500 ms | ~300 ms | 262 μs |
Publications & artifacts.
Every claim on this site is backed by a paper, a dataset, or a public benchmark. The research is the product.
For enterprise.
AEGIS is built for integration, not replacement. Three pathways to deploy physics-based network defense.
Enterprise Licensing
Embed the AEGIS detection engine directly into your existing SOC or SIEM pipeline. Physics-based anomaly detection with sub-millisecond latency. No rearchitecting required — AEGIS integrates as a standalone inference module at your network perimeter.
Pilot Deployment
Deploy AEGIS on NVIDIA BlueField DPU hardware for data center perimeter defense. We run a structured 90-day pilot — your infrastructure, your traffic, our detection engine. Zero payload inspection means zero privacy liability during evaluation.
Research Partnership
Co-develop on next-generation AEGIS architectures (PELT V4) and gain access to the Vixero adversarial corpus — 908,037 sequences across 4 threat tiers. Ideal for academic institutions, national cybersecurity agencies, and advanced threat research teams.
Privacy by Architecture — Not by Promise.
AEGIS operates exclusively on 6-dimensional flow physics: packet timing, size, TCP flags, directionality. Payload bytes are deliberately and permanently discarded at the eBPF ingress layer before any neural processing occurs. This means:
- Zero payload stored
- Zero TLS interception required
- Zero user data retained or processed
- GDPR and PDPA compliant by architectural design
- No man-in-the-middle liability for your organization
Unlike Deep Packet Inspection or TLS proxy solutions, AEGIS cannot leak user data — because it never reads it.
Roadmap.
From dorm-room research to sovereign cybersecurity infrastructure. Four phases, one mission.
- AEGIS V3 · arXiv:2604.02149 ✓
- 908K-sequence corpus released ✓
- NVIDIA Inception + Anthropic CVP ✓
- AWS Activate $10K approved ✓
- AegisScan beta shipped ✓
- IEEE TIFS submission · in progress
- PELT (AEGIS V4): Permutation Entropy + CfC + TTT-Linear
- HBEE human entropy engine · preprint
- AWS A10G benchmark validation
- AegisScan Pro · Team tiers
- USENIX Security 2027 submission
- TensorRT compilation for BlueField DPU line-rate
- GTC 2027 poster + live demo (Santa Clara)
- First enterprise pilot deployment
- AegisScan Enterprise · SOC integration
- Sdn Bhd incorporation · MD Status
- ASEAN sovereign cybersecurity positioning
- Multi-vendor SOC integration (CrowdStrike, Palo Alto)
- Government and defense contract pipeline
- OEM licensing at scale
For investors & partners.
Vixero is a research-first deep-tech company with a shipping product, a peer-reviewable paper, and institutional backing. Not a deck. Not a demo.
Founding myth.
AEGIS was not born in a well-funded lab. Built on a rented cloud server. Trained on real malware. Submitted to NVIDIA on the same day as Jensen Huang's GTC keynote. AMOI was built first — its failure modes studied, then reversed into a defense system. 45 days. Rented server. Published on arXiv.
For Humanity, From Humanity.For humanity, from humanity.
Vixero is accelerating AEGIS toward production-grade TensorRT compilation for BlueField DPU line-rate deployment in next-generation data centers. We are open to partners, pilots, and principled capital.