Funded R&D Initiative
Live POC data from our core research team. Engineering prevention-first security architectures. 105+ attack techniques mapped and analyzed.
Coverage by Status
Threat Categories - Coverage Matrix
105 Techniques
Strips PROCESS_VM_WRITE
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Strips Write rights to suspended process
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
No CreateRemoteThread / WriteProcessMemory
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Cannot allocate remote memory
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Strips PROCESS_SUSPEND_RESUME & SET_CONTEXT
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Initial Create intercepted. Payload redirects to Sandbox
Category
Process Injection & Manipulation
Status
Mitigation
SandboxAI
Write masking prevents payload placement on real disk
Category
Process Injection & Manipulation
Status
Mitigation
SandboxAI
Prevents interaction with real delete-pending binaries
Category
Process Injection & Manipulation
Status
Mitigation
SandboxAI
Uses Global Atom Table (Shared Kernel Object)
Category
Process Injection & Manipulation
Status
Mitigation
None
Uses SetWindowLong via User32
Category
Process Injection & Manipulation
Status
Mitigation
None
Requires Handle with THREAD_SET_CONTEXT
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Modifying PE Header redirects to Sandbox copy
Category
Process Injection & Manipulation
Status
Mitigation
SandboxAI
Kernel/Memory modification blocked
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Cannot open handle to spoofed parent
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Can only hook self. Others are unreachable
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
Can only hook self
Category
Process Injection & Manipulation
Status
Mitigation
Object Sentinel
evil.dll drops to Sandbox. Loader checks Real path
Category
DLL & Linking Attacks
Status
Mitigation
SandboxAI
System32 masked; cannot see target locations
Category
DLL & Linking Attacks
Status
Mitigation
ZMView
Hides non-essential paths from search
Category
DLL & Linking Attacks
Status
Mitigation
ZMView
Filesystem Virt. doesn't cover Registry
Category
Persistence
Status
Mitigation
None
RPC/COM to Task Scheduler Service allowed
Category
Persistence
Status
Mitigation
None
SC Manager (RPC) allowed
Category
Persistence
Status
Mitigation
None
COM/RPC allowed
Category
Persistence
Status
Mitigation
None
WMI (RPC) allowed
Category
Persistence
Status
Mitigation
None
Registry/AD based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Registry (HKCR) based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Registry based
Category
Persistence
Status
Mitigation
None
Dropped to disk -> Sandbox. IIS can't see it
Category
Persistence
Status
Mitigation
SandboxAI
Renaming allowed, but context remains isolated
Category
Defense Evasion
Status
Mitigation
ZMView
Code executes, but remains isolated
Category
Defense Evasion
Status
Mitigation
Object Sentinel
winevt folder is Hidden/Read-Only
Category
Defense Evasion
Status
Mitigation
ZMView
We don't check signatures
Category
Defense Evasion
Status
Mitigation
N/A
cmd, powershell, certutil are Not Found
Category
Defense Evasion
Status
Mitigation
ZMView
Cannot persist or migrate. Dies with process
Category
Defense Evasion
Status
Mitigation
Object Sentinel
Downloads payload to Sandbox. Cannot exec/invade
Category
Defense Evasion
Status
Mitigation
SandboxAI
Modifies timestamp of Sandbox file only
Category
Defense Evasion
Status
Mitigation
SandboxAI
Doesn't affect isolation
Category
Defense Evasion
Status
Mitigation
N/A
Doesn't affect isolation
Category
Defense Evasion
Status
Mitigation
N/A
Permanent Cage concept
Category
Defense Evasion
Status
Mitigation
N/A
Malware detects trap and quits
Category
Defense Evasion
Status
Mitigation
N/A
Cannot open handle to AV process
Category
Defense Evasion
Status
Mitigation
Object Sentinel
Strips TOKEN_DUPLICATE / TOKEN_ASSIGN_PRIMARY
Category
Defense Evasion
Status
Mitigation
Object Sentinel
pcalua.exe, forfiles.exe hidden
Category
Defense Evasion
Status
Mitigation
ZMView
Strips PROCESS_VM_READ from lsass.exe
Category
Credential Access
Status
Mitigation
Object Sentinel
GetAsyncKeyState works globally in User32
Category
Credential Access
Status
Mitigation
None
SetWindowsHookEx monitors messages
Category
Credential Access
Status
Mitigation
None
Network attack
Category
Credential Access
Status
Mitigation
None
Network attack
Category
Credential Access
Status
Mitigation
None
Network attack
Category
Credential Access
Status
Mitigation
None
File access blocked/Hidden
Category
Credential Access
Status
Mitigation
ZMView
Network auth usage
Category
Credential Access
Status
Mitigation
None
Network auth usage
Category
Credential Access
Status
Mitigation
None
Cannot inject into Browser
Category
Credential Access
Status
Mitigation
Object Sentinel
Access to Cookies DB virtualized/hidden
Category
Credential Access
Status
Mitigation
ZMView
Network login attempts allowed
Category
Credential Access
Status
Mitigation
None
Network based
Category
Credential Access
Status
Mitigation
None
File-based bypass blocked. Registry works
Category
Privilege Escalation
Status
Mitigation
SandboxAI
OpenProcessToken blocked
Category
Privilege Escalation
Status
Mitigation
Object Sentinel
Write to system paths redirected
Category
Privilege Escalation
Status
Mitigation
SandboxAI
Write to root path redirected
Category
Privilege Escalation
Status
Mitigation
SandboxAI
Registry based
Category
Privilege Escalation
Status
Mitigation
None
Registry based
Category
Privilege Escalation
Status
Mitigation
None
Unix concept
Category
Privilege Escalation
Status
Mitigation
N/A
No Network filtering
Category
Command & Control
Status
Mitigation
None
Can encode before sending
Category
Command & Control
Status
Mitigation
None
DNS requests allowed
Category
Command & Control
Status
Mitigation
None
Allowed
Category
Command & Control
Status
Mitigation
None
Allowed
Category
Command & Control
Status
Mitigation
None
Allowed
Category
Command & Control
Status
Mitigation
None
Allowed
Category
Command & Control
Status
Mitigation
None
Allowed
Category
Command & Control
Status
Mitigation
None
Attachment opens in isolated process
Category
Initial Access
Status
Mitigation
Object Sentinel
Browser opens URL (Browser is isolated)
Category
Initial Access
Status
Mitigation
Object Sentinel
Exploit runs in isolated Browser
Category
Initial Access
Status
Mitigation
Object Sentinel
Web Server isolated. Shell cannot spawn
Category
Initial Access
Status
Mitigation
ZMView
Update installs, but new binary is isolated
Category
Initial Access
Status
Mitigation
SandboxAI
Attacker with creds can log in
Category
Initial Access
Status
Mitigation
None
RDP/VPN allowed
Category
Initial Access
Status
Mitigation
None
Physical access
Category
Initial Access
Status
Mitigation
None
net user blocked, but API allowed
Category
Discovery
Status
Mitigation
None
Winsock API allowed
Category
Discovery
Status
Mitigation
None
IP Helper API allowed
Category
Discovery
Status
Mitigation
None
OpenProcess enumeration blocked
Category
Discovery
Status
Mitigation
Object Sentinel
Can only see ZMView / Sandbox
Category
Discovery
Status
Mitigation
ZMView
AD/LSA APIs allowed
Category
Discovery
Status
Mitigation
None
Malware sees it's trapped
Category
Discovery
Status
Mitigation
N/A
Outbound connections allowed
Category
Lateral Movement
Status
Mitigation
None
Can download tools to Sandbox
Category
Lateral Movement
Status
Mitigation
None
RDP hijacking
Category
Lateral Movement
Status
Mitigation
None
SMB allowed
Category
Lateral Movement
Status
Mitigation
None
RPC allowed
Category
Lateral Movement
Status
Mitigation
None
Network allowed
Category
Lateral Movement
Status
Mitigation
None
Encrypts fake files in Sandbox
Category
Impact
Status
Mitigation
SandboxAI
Raw Disk Access blocked
Category
Impact
Status
Mitigation
ZMView
Deletes Sandbox files only
Category
Impact
Status
Mitigation
SandboxAI
Defaces Sandbox files only
Category
Impact
Status
Mitigation
SandboxAI
CPU/RAM exhaustion possible
Category
Impact
Status
Mitigation
None
CPU exhaustion possible
Category
Impact
Status
Mitigation
None
Status Definitions
Blocked
Attack prevented entirely. No execution possible in any context.
Neutered
Attack executes but cannot achieve objective. Neutralized by isolation.
Evaded
Current mitigations do not cover this vector. Requires research.
Allowed
Intentionally permitted for operational compatibility and use cases.
We are actively recruiting security researchers, threat analysts, and systems engineers to collaborate on next-generation prevention architectures.