SCBE-AETHERMOORE
← All Articles
April 5, 2026 · 6 min read · Issac Davis
Security Research

Tri-Synesthesia: Detecting Threats with Light, Sound, and Code

A single-sensor security detector is easy to fool. You write a rule that says "if the data-flow rate doubles, raise an alarm," and an attacker simply makes sure the data-flow rate never doubles. You add a second rule, they sidestep that one too. This arms race eats every SIEM on the planet. The Tri-Synesthesia engine, one of the five modules in the Hyperbolic Security Suite, changes the game by running three different physical metaphors on the same event stream and only trusting a detection when all three agree.

Three Domains, Three Waves

Light: Data Flow as Electromagnetic Waves

Every flow of bytes through the system — sockets, pipes, disk reads, shared memory writes — is treated as a photonic signal. Byte rate becomes frequency, entropy becomes amplitude, and destination diversity becomes polarization. A running sliding-window FFT produces a continuous "light spectrum" of the system. Healthy systems emit smooth, mostly monochromatic spectra. Data exfiltration shows up as a characteristic broadband flare because it has to spread across many destinations at once.

Sound: Event Timing as Acoustic Patterns

The timing of syscalls, process forks, and RPC invocations is sampled into a waveform and analyzed as if it were audio. Legitimate workloads have rhythm — cron jobs tick, web servers have a request cadence, user sessions breathe at roughly human rates. Malicious code almost always sounds wrong. Rootkit hooks introduce microsecond-scale dissonance. Crypto miners emit a steady high-frequency whine. Ransomware sounds like a crescendo of disk writes climbing into a cliff.

Code: AST Structure as Waveforms

Running code has a shape. The engine parses every function that gets called — in user space via perf hooks, in kernel space via eBPF — and turns the AST depth and branching factor at each moment into a one-dimensional waveform. Handwritten, unobfuscated code produces gentle, compressible waveforms. Packed or polymorphic code produces high-entropy jagged noise. Control-flow flattening — a common obfuscator technique — produces a perfectly uniform waveform that is suspiciously too clean.

The Convergence Rule

None of the three domains is reliable on its own. Data flow alone has far too many benign spikes. Event timing alone trips on cron storms. AST shape alone can be gamed by deliberately ugly-looking legitimate code. But an attacker would have to fool all three metaphors simultaneously, and that is a much harder problem, because the three metaphors are not correlated in the ways attackers are used to.

The convergence rule is simple: compute anomaly probability in each domain, multiply them, and gate at a hyperbolic threshold. If light says 0.6, sound says 0.7, and code says 0.65, the joint probability is 0.6 × 0.7 × 0.65 = 0.273 — not enough to trigger. But if an event shows 0.95 in each domain, the joint probability is 0.857, and any two near-1 values plus one mid-range value will almost always exceed the gate.

Why Cross-Domain Is Harder to Fool

A prompt-injection attack, for example, has to push a lot of bytes (light), at an unusual cadence (sound), while invoking an unusual call graph (code). An attacker who hides in the light domain by staying under the byte-rate threshold ends up with an even weirder rhythm in the sound domain. An attacker who smooths the cadence has to use extra tool calls, which lights up the code domain. The three detectors are connected through a physical constraint: you cannot change one without budging the other two.

Spectral Coherence

The engine ties into Layer A9 of the 14-layer pipeline. Spectral coherence is the mathematical way of asking "are these three waves in phase?" When coherence is high across light, sound, and code, the joint signal is locked. Any attack that misaligns one of them lowers coherence — and because coherence feeds H(d, R) through a hyperbolic penalty, even a small coherence drop translates to a steep cost climb.

See It Live

The spectral coherence demo streams a simulated system through the three-domain analyzer in real time. You can inject faux-attacks (spike flow, stutter the timing, add a call-graph obfuscator) and watch the coherence indicator collapse. The demo is deliberately exaggerated so you can see what each domain contributes, but the underlying math is the same one running in the production tri-synesthesia engine.

Caveats

The engine is not free. FFTs on byte flow and AST-waveform synthesis on hot paths add real CPU cost, which is why tri-synesthesia is usually applied selectively — to agents inside the HYDRA swarm, to boundary processes, and to anything flagged by cheaper upstream detectors. Nobody runs cross-domain analysis on every syscall in the kernel. But wherever it runs, fool-rates drop from "tunable by a motivated attacker" to "requires simultaneous physical violation of three independent models," and that is a very different threat landscape.