AI Market Logo
BTC $43,552.88 -0.46%
ETH $2,637.32 +1.23%
BNB $312.45 +0.87%
SOL $92.40 +1.16%
XRP $0.5234 -0.32%
ADA $0.8004 +3.54%
AVAX $32.11 +1.93%
DOT $19.37 -1.45%
MATIC $0.8923 +2.67%
LINK $14.56 +0.94%
HAIA $0.1250 +2.15%
BTC $43,552.88 -0.46%
ETH $2,637.32 +1.23%
BNB $312.45 +0.87%
SOL $92.40 +1.16%
XRP $0.5234 -0.32%
ADA $0.8004 +3.54%
AVAX $32.11 +1.93%
DOT $19.37 -1.45%
MATIC $0.8923 +2.67%
LINK $14.56 +0.94%
HAIA $0.1250 +2.15%
Project Ire: Microsoft's autonomous malware detection AI agent
malware-detection

Project Ire: Microsoft's autonomous malware detection AI agent

Microsoft’s Project Ire prototype autonomously detects malware with high accuracy, promising a new era in AI-driven cybersecurity.

August 5, 2025
5 min read
Zeljka Zorz

Microsoft’s Project Ire prototype autonomously detects malware with high accuracy, promising a new era in AI-driven cybersecurity.

Project Ire: Microsoft’s Autonomous AI Agent Revolutionizing Malware Detection

Microsoft is developing an AI agent focused on autonomous malware detection. The prototype, named Project Ire, is demonstrating significant promise, according to a company announcement on August 5, 2025. Tested against a dataset of known malicious and benign Windows drivers, Project Ire accurately identified 90% of all files and flagged only 2% of benign files as threats. In a separate evaluation involving nearly 4,000 files that Microsoft’s automated systems could not classify and which had not been manually reviewed by expert reverse engineers, Project Ire correctly flagged nearly 90% of malicious files. It maintained a low false positive rate of 4% and detected approximately 25% of all actual malware.
“While overall performance was moderate, this combination of accuracy and a low error rate suggests real potential for future deployment,” the research team noted.

About Project Ire

Currently in the prototype phase, Project Ire leverages advanced language models available through Azure AI Foundry, alongside various reverse engineering and binary analysis tools. The evaluation of each sample begins with automated reverse engineering to determine the file type, structure, and identify areas requiring deeper analysis. Following this triage, the system reconstructs the software’s control flow graph using frameworks such as angr and Ghidra. This graph maps the program’s execution flow, enabling iterative analysis of each function with the assistance of language models and specialized tools. Summaries from these analyses are compiled into a “chain of evidence” record, providing transparency into the system’s reasoning. This record allows security teams to review results and helps developers refine the system when misclassifications occur. Project Ire applies Microsoft’s public criteria to classify samples as malware, potentially unwanted applications, tampering software, or benign files. To verify its findings, Project Ire invokes a validator tool that cross-checks claims against the chain of evidence. This tool incorporates expert statements from malware reverse engineers on the Project Ire team. Based on this evidence and its internal model, the system generates a final report classifying the sample as malicious or benign. There have been instances where Project Ire’s AI reasoning contradicted human experts but was ultimately proven correct. Mike Walker, Research Manager at Microsoft, told Help Net Security that these cases highlight the complementary strengths of humans and AI in cybersecurity.
“Our system is designed to capture risk reasoning at each step, and it’s critical to have a detailed audit trail of line-of-reasoning to allow for deeper investigation of the system.”
Project Ire is planned to be integrated into Microsoft Defender as a binary analyzer tool for threat detection and software classification. Looking forward, researchers hope Project Ire will autonomously detect novel malware directly in memory at scale.
Source: Originally published at Help Net Security on August 5, 2025.

Frequently Asked Questions

About Project Ire

Q: What is Project Ire? A: Project Ire is Microsoft's prototype autonomous AI agent designed for malware detection. Q: How accurate is Project Ire in detecting malware? A: In tests against known malicious and benign Windows drivers, Project Ire identified 90% of files correctly and flagged only 2% of benign files as threats. In a separate evaluation, it flagged nearly 90% of malicious files from an unclassified dataset with a 4% false positive rate. Q: What technologies does Project Ire use? A: Project Ire utilizes advanced language models from Azure AI Foundry, alongside reverse engineering and binary analysis tools, including frameworks like angr and Ghidra. Q: What is the "chain of evidence" in Project Ire? A: The "chain of evidence" is a record compiled from the analyses performed by Project Ire, providing transparency into the system's reasoning process, which allows security teams to review results and developers to refine the system. Q: Where is Project Ire intended to be integrated? A: Project Ire is planned for integration into Microsoft Defender as a binary analyzer tool for threat detection and software classification.

Crypto Market AI's Take

The development of autonomous AI agents like Microsoft's Project Ire signifies a crucial advancement in cybersecurity. At AI Crypto Market, we understand the power of AI in automating complex tasks and enhancing security. Our own AI agents are designed to provide sophisticated market analysis and trading strategies, but the application of AI in threat detection and response, as demonstrated by Project Ire, is equally vital. Ensuring the integrity and security of digital systems is paramount, especially in the rapidly evolving landscape of cybersecurity. As AI capabilities grow, so does the importance of robust security measures to protect against sophisticated threats.

More to Read: