Skip to content
View nevinshine's full-sized avatar
:octocat:
Building Sentinel
:octocat:
Building Sentinel

Block or report nevinshine

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nevinshine/README.md
Typing SVG

Email      


Research Focus

"Observability is the best Defense."

I am a Systems Security Research Engineer specializing in Runtime Verification. My work focuses on bridging low-level Kernel tracing with behavioral analysis to detect execution anomalies.

Current Investigation:

  • Sentinel Runtime: Building a custom ptrace-based execution monitor to intercept and verify Linux System Calls.
  • Behavioral Analysis: Modeling syscall traces as sequences to detect malicious intent without signatures.
  • Goal: Preparing for MSc-level research in Systems and Security.



Research Activity


Technical Lab (Arsenal)

Systems & Kernel (The Engine)



Analysis & Logic (The Defense)


Pinned Loading

  1. mindscape-bci-research mindscape-bci-research Public

    EEG-based Brain-Computer Interface converting neural signals into cloud triggers. 🏆 Winner: Best Project Award 2025.

    1

  2. sentinel-runtime sentinel-runtime Public

    Runtime Malware Analysis Engine using Linux ptrace & Isolation Forests.

    Python 1

  3. systems-security-foundations systems-security-foundations Public

    Building a hardened Linux environment, security tools, and automation scripts from scratch.

    Shell 1

  4. runtime-security-dossier runtime-security-dossier Public

    The central laboratory notebook for the Sentinel Runtime Verification System. Focus: Linux Kernel, Ptrace, and Anomaly Detection.

    MDX 1