Skip to content

M3.4: Final Research Artifact

Date: January 2026 Version: M3.4-final (Gold Master)

This log marks the conclusion of the active engineering phase. Sentinel Runtime has transitioned from a development prototype to a validated Research Artifact for the CISPA MSc Application.

  • Codebase: Clean separation of concerns (src/ vs tests/).
  • Defense: Full coverage for Ransomware, Exfiltration, and Rootkits.
  • Resilience: New Watchdog Orchestrator (scripts/watchdog.sh) ensures the defense cannot be disabled via SIGKILL.

We conducted a final stress test to quantify the cost of “Active Defense.”

MetricResultContext
Syscall Latency~30x overheadUnavoidable with ptrace. Acceptable for high-security modes.
IPC Throughput28,628 events/secSufficient for standard desktop workloads.
Memory Usage110 MBStable (Python Runtime + TensorFlow Lite).

The following immutable artifacts verify the system’s efficacy.

Sentinel Active Defense Demo: Sentinel Runtime Demo

  • Ransomware Block: Immediate termination of encryption loop.
  • Exfiltration Block: Detection of tainted data leak.
  • Persistence: Automatic resurrection after kill -9.

Sentinel Runtime M3.4 - Source Code