{"id":1144806,"date":"2025-08-05T06:39:20","date_gmt":"2025-08-05T13:39:20","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=1144806"},"modified":"2025-08-07T18:23:57","modified_gmt":"2025-08-08T01:23:57","slug":"project-ire","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/project-ire\/","title":{"rendered":"Project Ire"},"content":{"rendered":"
\n\t
\n\t\t
\n\t\t\t\"cyber\t\t<\/div>\n\t\t\n\t\t
\n\t\t\t\n\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n

Project Ire<\/h1>\n\n\n\n

Autonomous malware classification<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n

Project Ire<\/h2>\n\n\n\n

Project Ire is an LLM-powered autonomous malware classification system. <\/p>\n\n\n\n

<\/p>\n\n\n\n

For inquiries, please direct mail to: ireinquiries@service.microsoft.com<\/a><\/p>\n\n\n\n\n\n\n\n

\n\t
\n\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\t\"Stylized\t\t\t\t<\/a>\n\t\t\t\t\t\t\tBlog<\/span>\n\t\t\tProject Ire autonomously identifies malware at scale<\/span> <\/span><\/a>\t\t\t\t\t\t\t

Designed to classify software without context, Project Ire replicates the gold standard in malware analysis through reverse engineering. It streamlines a complex, expert-driven process, making large-scale malware detection faster & more consistent.<\/p>\n\t\t\t\t\t<\/div>\n\t<\/article>\n<\/div>\n\n\n\n

<\/div>\n","protected":false},"excerpt":{"rendered":"

Autonomous malware classification Project Ire is an LLM-powered autonomous malware classification system. For inquiries, please direct mail to: ireinquiries@service.microsoft.com<\/p>\n","protected":false},"featured_media":1144907,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13556,13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-1144806","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-artificial-intelligence","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[1145100],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Brian Caswell","user_id":39420,"people_section":"People","alias":"bcaswell"},{"type":"user_nicename","display_name":"Dustin Fraze","user_id":43946,"people_section":"People","alias":"dustinfraze"},{"type":"user_nicename","display_name":"Sarah Smith","user_id":42579,"people_section":"People","alias":"smithsarah"},{"type":"user_nicename","display_name":"Shelby Hayes","user_id":43937,"people_section":"People","alias":"shhayes"},{"type":"guest","display_name":"Stanley He","user_id":1145314,"people_section":"People","alias":""},{"type":"user_nicename","display_name":"Katy Smith","user_id":43936,"people_section":"People","alias":"katysmith"},{"type":"user_nicename","display_name":"Bhakta Pradhan","user_id":43943,"people_section":"People","alias":"bhpradha"},{"type":"user_nicename","display_name":"Mike Walker","user_id":39150,"people_section":"People","alias":"walkerm"},{"type":"user_nicename","display_name":"Cory Duplantis","user_id":43935,"people_section":"People","alias":"cduplantis"},{"type":"user_nicename","display_name":"Bob Fleck","user_id":43918,"people_section":"People","alias":"bobfleck"}],"msr_research_lab":[199565,1161007],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/1144806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":10,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/1144806\/revisions"}],"predecessor-version":[{"id":1163490,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/1144806\/revisions\/1163490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/1144907"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=1144806"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=1144806"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=1144806"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=1144806"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=1144806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}