Sentinel Mission Brief
Project Metadata
Section titled “Project Metadata”- Status: Research Artifact (Active)
- Current Capability: M2.1 (Universal Syscall Extraction & VFORK Tracking)
- Target: CISPA / Saarland MSc Application
Abstract
Section titled “Abstract”Sentinel Runtime is a Linux runtime defense system designed to investigate syscall-level observability and semantic enforcement. Unlike traditional signature-based AVs, Sentinel leverages ptrace to establish a closed-loop runtime control system. It connects a high-speed C interception kernel to a Python-based analysis engine (WiSARD) to evaluate process intent against security policies in real-time.
M2.1: Universal Active Defense (Live Demo)
Section titled “M2.1: Universal Active Defense (Live Demo)”Demonstration of Sentinel Runtime operating in “X-Ray Mode.” It actively tracks modern shell behavior (vfork) and enforces a Block-on-Intent policy.
- Scenario: A user attempts to delete a protected file (unlink syscall).
- Result: Sentinel intercepts the syscall, consults the Policy Engine, and injects a block verdict (EPERM) before the kernel executes the deletion.
Capability Milestone Status
Section titled “Capability Milestone Status”- Deep Introspection (M0.8): [COMPLETE] Argument extraction via PTRACE_PEEKDATA.
- Online Inference Loop (M1.0): [COMPLETE] Real-time decision pipeline via Named Pipes (IPC).
- Recursive Process Tracking (M2.0): [COMPLETE] Tracing dynamic trees via PTRACE_O_TRACEFORK.
- Universal Extraction (M2.1): [OPERATIONAL] The Universal Eye. Map-based extraction for unlink, openat, execve.
- Stealth Tracking (M2.1): [OPERATIONAL] VFORK Support. Detecting optimized shell spawns (dash/sh).
- Semantic Bucketing (M3.0): [IN PROGRESS] Converting raw paths into semantic concepts (e.g., “Ransomware Activity”).
Architecture (Refactored M2.1)
Section titled “Architecture (Refactored M2.1)”Sentinel operates as a modular closed-loop runtime control system:
1. Systems Layer (C / Kernel Space)
Section titled “1. Systems Layer (C / Kernel Space)”- Interception Engine (main.c): A recursive ptrace monitor supporting FORK, CLONE, and VFORK.
- Universal Map (syscall_map.h): A research artifact defining the “DNA” of syscalls (Registers, Types, Names).
- Visualization (logger.c): Real-time tree hierarchy rendering.
2. Analysis Layer (Python / Data Space)
Section titled “2. Analysis Layer (Python / Data Space)”- Neural Engine (brain.py): The decision center. Parses SYSCALL:verb:arg signals and issues Block/Allow verdicts.
- Mock Brain (mock_brain.py): Lightweight testing tool for engine validation.
Execution Control Loop (M2.1)
Section titled “Execution Control Loop (M2.1)”Terminal 1 (The Brain):
$ python3 src/analysis/brain.py+ [INFO] Neural Engine Online.+ [LOG] Action: execve | Path: /bin/sh- [ALERT] BLOCKED THREAT: unlink -> protected.txtTerminal 2 (The Sentinel):
# Syntax: ./bin/sentinel <trigger_word> <target_binary>sudo ./bin/sentinel test /bin/sh# Inside monitored session:# rm protected.txtrm: cannot remove 'protected.txt': Operation not permittedLive Demo (The Sentinel):
