Skip to content

Sentinel Mission Brief

  • Status: Research Artifact (Active)
  • Current Capability: M2.1 (Universal Syscall Extraction & VFORK Tracking)
  • Target: CISPA / Saarland MSc Application

Sentinel Runtime is a Linux runtime defense system designed to investigate syscall-level observability and semantic enforcement. Unlike traditional signature-based AVs, Sentinel leverages ptrace to establish a closed-loop runtime control system. It connects a high-speed C interception kernel to a Python-based analysis engine (WiSARD) to evaluate process intent against security policies in real-time.

M2.1: Universal Active Defense (Live Demo)

Section titled “M2.1: Universal Active Defense (Live Demo)”

Demonstration of Sentinel Runtime operating in “X-Ray Mode.” It actively tracks modern shell behavior (vfork) and enforces a Block-on-Intent policy.

  • Scenario: A user attempts to delete a protected file (unlink syscall).
  • Result: Sentinel intercepts the syscall, consults the Policy Engine, and injects a block verdict (EPERM) before the kernel executes the deletion.

  • Deep Introspection (M0.8): [COMPLETE] Argument extraction via PTRACE_PEEKDATA.
  • Online Inference Loop (M1.0): [COMPLETE] Real-time decision pipeline via Named Pipes (IPC).
  • Recursive Process Tracking (M2.0): [COMPLETE] Tracing dynamic trees via PTRACE_O_TRACEFORK.
  • Universal Extraction (M2.1): [OPERATIONAL] The Universal Eye. Map-based extraction for unlink, openat, execve.
  • Stealth Tracking (M2.1): [OPERATIONAL] VFORK Support. Detecting optimized shell spawns (dash/sh).
  • Semantic Bucketing (M3.0): [IN PROGRESS] Converting raw paths into semantic concepts (e.g., “Ransomware Activity”).

Sentinel operates as a modular closed-loop runtime control system:

  • Interception Engine (main.c): A recursive ptrace monitor supporting FORK, CLONE, and VFORK.
  • Universal Map (syscall_map.h): A research artifact defining the “DNA” of syscalls (Registers, Types, Names).
  • Visualization (logger.c): Real-time tree hierarchy rendering.
  • Neural Engine (brain.py): The decision center. Parses SYSCALL:verb:arg signals and issues Block/Allow verdicts.
  • Mock Brain (mock_brain.py): Lightweight testing tool for engine validation.

Terminal 1 (The Brain):

Terminal window
$ python3 src/analysis/brain.py
+ [INFO] Neural Engine Online.
+ [LOG] Action: execve | Path: /bin/sh
- [ALERT] BLOCKED THREAT: unlink -> protected.txt

Terminal 2 (The Sentinel):

Terminal window
# Syntax: ./bin/sentinel <trigger_word> <target_binary>
sudo ./bin/sentinel test /bin/sh
# Inside monitored session:
# rm protected.txt
rm: cannot remove 'protected.txt': Operation not permitted

Live Demo (The Sentinel):

Sentinel Demo