{"id":23228,"date":"2025-11-25T12:02:42","date_gmt":"2025-11-25T12:02:42","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=23228"},"modified":"2025-11-25T12:02:43","modified_gmt":"2025-11-25T12:02:43","slug":"amazon-is-using-specialized-ai-agents-for-deep-bug-hunting","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=23228","title":{"rendered":"Amazon Is Using Specialized AI Agents for Deep Bug Hunting"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"lead-in-text-callout\">As generative AI<\/span> pushes the <a href=\"https:\/\/www.wired.com\/story\/why-did-a-10-billion-dollar-startup-let-me-vibe-code-for-them-and-why-did-i-love-it\/\">speed of software development<\/a>, it&#8217;s also enhancing the power of digital attackers to hold out <a href=\"https:\/\/www.wired.com\/tag\/ransomware\/\">financially motivated<\/a> or <a href=\"https:\/\/www.wired.com\/story\/brass-typhoon-china-cyberspies\/\">state-backed<\/a> hacks. Because of this safety groups at tech firms have extra code than ever to evaluate whereas coping with much more stress from unhealthy actors. On Monday, <a href=\"https:\/\/www.wired.com\/tag\/amazon\/\">Amazon<\/a> will publish particulars for the primary time of an inside system referred to as Autonomous Risk Evaluation (ATA), which the corporate has been utilizing to assist its safety groups proactively establish weaknesses in its platforms, carry out variant evaluation to rapidly seek for different, related flaws, after which develop remediations and detection capabilities to plug holes earlier than attackers discover them.<\/p>\n<p class=\"paywall\">ATA was born out of an inside Amazon hackathon in August 2024, and safety group members say that it has grown into an important device since then. The important thing idea underlying ATA is that it&#8217;s not a single AI agent developed to comprehensively conduct safety testing and menace evaluation. As a substitute, Amazon developed a number of specialised AI brokers that compete in opposition to one another in two groups to quickly examine actual assault strategies and alternative ways they might be used in opposition to Amazon&#8217;s methods\u2014after which suggest safety controls for human evaluate.<\/p>\n<p class=\"paywall\">\u201cThe preliminary idea was aimed to deal with a essential limitation in safety testing\u2014restricted protection and the problem of conserving detection capabilities present in a quickly evolving menace panorama,&#8221; Steve Schmidt, Amazon&#8217;s chief safety officer, tells WIRED. \u201cRestricted protection means you&#8217;ll be able to\u2019t get by means of the entire software program or you&#8217;ll be able to\u2019t get to the entire purposes since you simply don\u2019t have sufficient people. After which it\u2019s nice to do an evaluation of a set of software program, however in the event you don\u2019t maintain the detection methods themselves updated with the adjustments within the menace panorama, you\u2019re lacking half of the image.\u201d<\/p>\n<p class=\"paywall\">As a part of scaling its use of ATA, Amazon developed particular \u201chigh-fidelity\u201d testing environments which might be deeply real looking reflections of Amazon&#8217;s manufacturing methods, so ATA can each ingest and produce actual telemetry for evaluation.<\/p>\n<p class=\"paywall\">The corporate&#8217;s safety groups additionally made a degree to design ATA so each method it employs, and detection functionality it produces, is validated with actual, automated testing and system information. Pink group brokers which might be engaged on discovering assaults that might be used in opposition to Amazon&#8217;s methods execute precise instructions in ATA&#8217;s particular take a look at environments that produce verifiable logs. Blue group, or defense-focused brokers, use actual telemetry to substantiate whether or not the protections they&#8217;re proposing are efficient. And anytime an agent develops a novel method, it additionally pulls time-stamped logs to show that its claims are correct.<\/p>\n<p class=\"paywall\">This verifiability reduces false positives, Schmidt says, and acts as \u201challucination administration.\u201d As a result of the system is constructed to demand sure requirements of observable proof, Schmidt claims that \u201challucinations are architecturally unattainable.\u201d<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/amazon-autonomous-threat-analysis\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As generative AI pushes the speed of software development, it&#8217;s also enhancing the power of digital attackers to hold out financially motivated or state-backed hacks. Because of this safety groups at tech firms have extra code than ever to evaluate whereas coping with much more stress from unhealthy actors. On Monday, Amazon will publish particulars [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23230,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[3037,116,7733,2417,7610,15036],"class_list":["post-23228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-agents","tag-amazon","tag-bug","tag-deep","tag-hunting","tag-specialized"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/23228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=23228"}],"version-history":[{"count":1,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/23228\/revisions"}],"predecessor-version":[{"id":23229,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/23228\/revisions\/23229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/23230"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=23228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=23228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=23228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}