Skip to main content
Surface 3 · Cyber Range & BAS

Authorized offense.
Reproducible attacks against your own stack.

The third CyberSecurityOS surface. Breach & Attack Simulation packaged as a managed service — reproducible attack scenarios, sandboxed against a copy of your production fleet, ATT&CK-scored, every run emitting a joule trace. Priced per scenario-hour.

Why this exists

Validation is a measurement, not an assertion.

A detection-and-response stack is worth nothing until an attack proves it catches what it says it catches. The industry answer is Breach & Attack Simulation — AttackIQ, SafeBreach, Cymulate, Pentera, Mandiant Advantage, AWS GameDay, Azure Attack Simulator. Customers buy them because compliance frameworks demand empirical coverage reports, and because "we assume our SIEM works" stops being acceptable the first time it doesn't.

The industry standard emits events. We emit events plus their thermodynamic signature. Every scenario run in the CyberSecurityOS range produces not just "did the SIEM see the attack" but the joule trace the attack left on CPU / GPU / ANE / NPU, the drift distance against the target's signed ledger, and the tolerance threshold above which detection would have fired. That's a measurement no other BAS vendor structurally produces — they don't instrument the silicon.

WHAT OTHERS MEASURE

"Was the alert raised?" Binary yes/no against a rule corpus.

WHAT WE MEASURE

The attack's joule profile, its drift distance, which tolerance would have caught it, which compute surfaces it touched.

WHAT IT MEANS

Coverage reports answer "how close did we come to missing this?" not just "did we see it?" Remediation becomes a tolerance tuning, not a rule rewrite.

Scenario catalogue

Twelve scenarios at launch.

Every scenario is a reproducible attack with a known joule signature, an ATT&CK technique ID, and a documented expected drift. Run one-shot for a validation pass, or subscribe to continuous BAS and let them run 24/7 against a sandbox copy of your fleet.

spectre-v1

T1203

Speculative-execution bounds-check bypass. Leaks via L1 cache timing on a victim process; joule signature shows anomalous branch-mispredict clustering.

class: serializing · branch

rowhammer

T1499.004

Repeated DRAM row activation inducing bit-flips in neighbouring rows. Distinctive joule profile: sustained high-rate load/store with zero compute variance.

class: load · store

rop-chain

T1055

Return-oriented programming. Control flow through gadgets in legitimate binaries; the joule trace spikes in `call`/`branch` at addresses the ledger never declared as entry points.

class: call · branch

process-injection

T1055.012

Foreign code executed inside a host process. Runtime joule trace contains classes (crypto, syscall) that the host binary's ledger does not declare.

unexpected_classes alert

crypto-miner

T1496

Steady-state compute pegging the CPU or GPU for cryptocurrency hashing. Total-energy verdict trips on +100% sustained drift; per-class shows disproportionate ALU/SHA.

class: alu · crypto · gpu_alu

ane-hijack

T1496 / novel

Attacker ships an ML model that runs on the Apple Neural Engine while the host binary's ledger declared only CPU work. unexpected_devices: [ane] fires immediately.

device: ane

gpu-exfil

T1041 + T1020

Sensitive data ferried through GPU device memory to evade host-process forensics. Detected via gpu_mem class activity in traces whose static ledger has no GPU workload.

device: gpu · class: gpu_mem

supply-chain-implant

T1195.002

Patched binary shipped through a compromised build system. The BLAKE3 signature changes; joule-sec diff against the last-known-good ledger surfaces the injected classes.

ledger diff · sig mismatch

side-channel-aes

T1557 / T1040

Power / timing analysis of a not-actually-constant-time AES implementation. Pairs with operator CLI leak-scan-bits to extract the leak spectrum.

dynamic leak-scan

dylib-hijack

T1574.007

Load-time replacement of a legitimate .dylib / .so. Host ledger unchanged; dependency ledger drifts. Caught only if both are signed and verified at load.

sig verify at load

ldpreload-shim

T1574.006

LD_PRELOAD shim intercepting crypto / network calls. Joule profile deviates on the crypto class without a corresponding ledger-declared crypto region.

class: crypto · syscall

model-poisoning

T1565 / novel

Tampered weights or ONNX graph in an AI pipeline. Runtime matmul/conv class profile on ANE / GPU diverges from the declared inference workload.

class: ane_matmul · gpu_tensor

Custom scenarios on request. The catalogue grows monthly as customers contribute signatures back to the shared corpus.

ATT&CK coverage

A board-presentable answer to "does it work?"

Every range run produces an ATT&CK-indexed coverage report: at your deployment's current tolerance settings, which techniques did we catch, which did we miss, and by how much. The miss distance IS the remediation — not an opinion, a scalar.

CyberSecurityOS coverage report — customer: acme-fintech-prod
tolerance : 0.050        ledger bundle : 2026-Q2-signed
run date  : 2026-04-23   fleet size    : 342 services

technique                     scenario                caught    margin
────────────────────────────────────────────────────────────────────
T1055   Process Injection     process-injection       ✓ yes     0.412  (L1 ≫ tol)
T1055   ROP                   rop-chain               ✓ yes     0.198
T1195   Supply Chain          supply-chain-implant    ✓ yes     1.000  (sig fail)
T1574.006 LD_PRELOAD          ldpreload-shim          ✓ yes     0.089
T1574.007 Dylib hijack        dylib-hijack            ⚠ partial 0.047  ← below tol
T1496   Resource hijack CPU   crypto-miner            ✓ yes     1.000
T1496   Resource hijack GPU   gpu-exfil               ✓ yes     0.784  (unexpected device)
T1496   Resource hijack ANE   ane-hijack              ✓ yes     0.612  (unexpected device)
T1203   Speculative abuse     spectre-v1              ✗ miss    0.023  ← tune tol or add rule
T1499.004 DRAM bit-flip       rowhammer               ✓ yes     0.156
T1557   Side-channel AES      side-channel-aes        ✓ yes     cohens_d=+12.3
T1565   ML model tamper       model-poisoning         ⚠ partial 0.041  ← below tol
────────────────────────────────────────────────────────────────────
caught: 10/12   partial: 2   missed: 1

recommendation: lower drift tolerance to 0.04 to close dylib-hijack
and model-poisoning margins. spectre-v1 requires a dedicated PMC rule
on branch-misprediction spikes; joule tolerance alone will not catch.

Sample output. Real reports arrive signed as JWP ReceiptPayloads and archive directly into your compliance evidence locker.

Deployment

Three shapes.

MANAGED

range.cybersecurityos.science

Hosted on the joulesperbit.ai energy substrate. Customers connect via authenticated JWP session, upload a fleet manifest, and schedule runs. Fastest time-to-value; priced per scenario-hour.

ON-PREM VPC

Deploy in your cloud

Terraform / Pulumi module provisions the range in your own AWS / GCP / Azure VPC. Customer data never leaves your perimeter. Scenarios pulled from the signed Transaction Science catalogue. Priced per fleet.

AIR-GAPPED

Sovereign / classified

Shipped as a signed tarball. Works without internet. Scenario updates delivered on physical media with an Ed25519 chain of custody. For defense, intelligence, and critical-infra primes.

Integration

Composes with the other two surfaces.

Category

BAS with a joule-trace backbone.

The Breach & Attack Simulation category already exists. CyberSecurityOS Range fits it by category and differs by substrate.

dimension
classic BAS
cyber-range platforms
CyberSecurityOS range
signal
rule + event matching
detonation in sandbox
joule trace + drift distance
verdict
caught / missed
caught / missed + artefacts
heterogeneous compute
CPU events only
CPU + network
CPU + GPU + ANE + NPU + FPGA
attested output
vendor report
vendor report
scenario corpus
closed
partially open
Comp set: AttackIQ, SafeBreach, Cymulate, Pentera, Mandiant Advantage, AWS GameDay, Azure Attack Simulator, CrowdStrike Falcon Complete Red Team.
Authorization

Every run is authorized. Every run is logged.

Scenarios run only against a fleet the customer owns and has declared under a master services agreement. Every run is signed with a named authorization token and archived in the customer's compliance evidence locker — sequential runs, immutable chain, court-admissible.

Scenarios that carry dual-use potential — speculative-execution abuse, side-channel extraction, supply-chain implant generation — are not distributed as standalone binaries. They are operator-authored in the operator CLI and executed inside the range's sandboxed environment. Leaving the sandbox requires signed artefact export under the MSA.

The range is a measurement instrument applied to authorized targets. Misuse is a contract breach, not a configuration flag.

Availability

Closed beta

Currently onboarding fintech platforms, cloud providers, and enterprise SOCs with an existing CyberSecurityOS deployment. First cohort closes when we reach twelve active customers.

Request beta access