Skip to content

Systems Security Research Dossier

Unifying Runtime Process Control & Kernel Datapath Enforcement

Modern defense often treats the Host (OS/Process) and the Network (Packet/Wire) as separate silos. This research portfolio explores the composition of these two domains to create a unified defense architecture.

Track 1: Sentinel Runtime

Domain: Host / Process / Syscall


Mechanism: ptrace + Anomaly Detection


Focus: Enforcing intent at the execution boundary. Sentinel prevents unauthorized syscall patterns and behavioral anomalies.


Explore Sentinel Research →

Track 2: Hyperion (Network)

Domain: Network / Driver / Packet


Mechanism: eBPF + XDP


Focus: Enforcing policy at the wire. Hyperion rejects malicious traffic in the NIC driver before the OS allocates memory.


Explore Hyperion Research →


DimensionSentinel (Host)Hyperion (Network)
LanguagePython / CC (eBPF) / Go
Hook Pointptrace (Syscall)XDP (Ingress)
LatencyMillisecondNanosecond
StateActive (Phase M3.4)Active (Phase M4.6)