Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware

Microsoft has unveiled Project Ire, a prototype autonomous AI agent that can analyze any software file to determine if it’s malicious.

Agentic AI

Microsoft on Tuesday unveiled Project Ire, a prototype autonomous AI agent that can analyze software files in order to determine whether they hide malware.

According to Microsoft, Project Ire can autonomously reverse engineer and classify software without any prior context, automating and scaling what can be a complex process. 

Project Ire was developed by teams at Microsoft Research, Microsoft Defender Research, and Microsoft Discovery & Quantum. 

It uses decompilers and other tools to gather data that enables it to determine whether a file is benign or malicious, while also providing a traceable chain of evidence.

“The system’s architecture allows for reasoning at multiple levels, from low-level binary analysis to control flow reconstruction and high-level interpretation of code behavior,” Microsoft explained.

It added, “Its tool-use API enables the system to update its understanding of a file using a wide range of reverse engineering tools, including Microsoft memory analysis sandboxes based on Project Freta, custom and open-source tools, documentation search, and multiple decompilers.”

Advertisement. Scroll to continue reading.

Project Ire’s goal is to reduce analyst error and fatigue, accelerate threat response, and strengthen defenses against evolving attacks, Microsoft said.

In tests conducted by the tech giant on a dataset of Windows drivers that included both malicious and benign software, Project Ire correctly identified 90% of files and only flagged 2% of the benign files as dangerous. 

In a different test targeting roughly 4,000 files that had been lined up for reverse engineering and analysis by human experts, Project Ire correctly flagged 9 out of 10 malicious files as malicious, with a false positive rate of only 4%. However, it was only able to detect approximately a quarter of all actual malware. 

Microsoft admitted that the overall performance was moderate, but argued that the testing conditions were challenging and the results still indicate “real potential for future deployment”.

“Based on these early successes, the Project Ire prototype will be leveraged inside Microsoft’s Defender organization as Binary Analyzer for threat detection and software classification,” Microsoft said.

“Our goal is to scale the system’s speed and accuracy so that it can correctly classify files from any source, even on first encounter. Ultimately, our vision is to detect novel malware directly in memory, at scale,” it added.

Related: Microsoft Offers $5 Million at Zero Day Quest Hacking Contest

Related: Microsoft Boosts .NET Bounty Program Rewards to $40,000

Related: Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Jacki Monson has joined CVS Health as SVP, Deputy CISO.

Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.