Skip to content

Threat Model & Analysis

We evaluate Sentinel-CC against the MITRE ATT&CK framework.

TacticTechniqueSentinel Defense
ExecutionNative API (T1106)Blocked by Whitelist (Caller Validation)
PersistenceBPF Implant (T1546)Blocked by sys_bpf Trap
Defense EvasionIndirect SyscallsBlocked by Deep CFI (Stack Check)
C2Standard ProtocolBlocked by Hyperion (Payload Inspection)
  • JIT Spraying: Currently, Sentinel-CC does not validate dynamically generated code (Phase 4 Roadmap).
  • Kernel Exploits: If the kernel itself is compromised (Ring 0 exploit), the eBPF hooks can be bypassed.