Microsoft introduces Project Ire: AI prototype for analysis and classification of malware.

Microsoft has introduced Project Ire, a cutting-edge AI prototype designed to revolutionize the analysis and classification of software, particularly malware, without human intervention. This ambitious initiative harnesses the power of large language models (LLMs), decompilers, and specialized analysis tools, automating the gold standard of malware classification—comprehensive reverse engineering of unknown software files.

A New Era of Automated Threat Analysis

Project Ire aims to accelerate threat detection and reduce dependency on manual security analysts by enabling autonomous analysis of files at scale. The system is engineered to carry out in-depth investigations at every level, from binary analysis to reconstructing control flow and interpreting high-level program behavior. This comprehensive approach ensures accurate differentiation between benign and malicious files.

At the heart of Project Ire is an advanced API designed to orchestrate a suite of reverse engineering resources. These include Microsoft’s own Project Freta—capable of examining undetected malware in live Linux memory—as well as open-source tools such as angr and Ghidra. The API also leverages a range of decompilers, documentation search functions, and other validation tools to support its analysis.

Sophisticated Workflow and Evidence-Based Results

Project Ire’s multi-layered workflow encompasses:

  • Automated identification of file types and structural features
  • Reconstruction of control flow graphs
  • Summarization of critical software functions using task-specific tools
  • Application of validators to cross-check findings and reinforce decision-making

To support transparency and continuous improvement, the system maintains a detailed “chain of evidence” log, recording each step and rationale behind its classification verdicts. This allows security teams to review decisions and refine procedures in the event of errors or ambiguities.

Proven Effectiveness and Future Integration

Initial evaluations of Project Ire have demonstrated robust performance. In tests involving Windows driver datasets, the system correctly identified 90% of files with just a 2% false positive rate on benign samples. When challenged with a more rigorous set of nearly 4,000 samples, Project Ire continued to deliver, correctly classifying approximately 90% of malicious files and maintaining a low 4% false positive rate.

Looking ahead, Microsoft plans to integrate Project Ire into its Defender suite as the Binary Analyzer. The objective is to enable rapid, first-encounter classification of files and eventually detect previously unknown malware directly in system memory, all at enterprise scale.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply