• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google introduces project naptime for ai powered vulnerability research

Google Introduces Project Naptime for AI-Powered Vulnerability Research

You are here: Home / General Cyber Security News / Google Introduces Project Naptime for AI-Powered Vulnerability Research
June 24, 2024

Google has designed a new framework named Venture Naptime that it claims enables a large language product (LLM) to have out vulnerability investigate with an aim to boost automatic discovery approaches.

“The Naptime architecture is centered close to the conversation concerning an AI agent and a goal codebase,” Google Project Zero researchers Sergei Glazunov and Mark Manufacturer said. “The agent is delivered with a set of specialized instruments built to mimic the workflow of a human security researcher.”

The initiative is so named for the reality that it makes it possible for individuals to “just take regular naps” while it assists with vulnerability exploration and automating variant examination.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The method, at its main, seeks to choose advantage of innovations in code comprehension and standard reasoning capacity of LLMs, consequently making it possible for them to replicate human behavior when it arrives to pinpointing and demonstrating security vulnerabilities.

Cybersecurity

It encompasses numerous parts this sort of as a Code Browser instrument that allows the AI agent to navigate as a result of the target codebase, a Python resource to run Python scripts in a sandboxed natural environment for fuzzing, a Debugger device to observe plan behavior with diverse inputs, and a Reporter resource to check the progress of a activity.

AI-Powered Vulnerability Research

Google reported Naptime is also product-agnostic and backend-agnostic, not to mention be greater at flagging buffer overflow and sophisticated memory corruption flaws, according to CYBERSECEVAL 2 benchmarks. CYBERSECEVAL 2, launched previously this April by scientists from Meta, is an analysis suite to quantify LLM security challenges.

In checks carried out by the search giant to reproduce and exploit the flaws, the two vulnerability groups realized new top rated scores of 1.00 and .76, up from .05 and .24, respectively for OpenAI GPT-4 Turbo.

“Naptime allows an LLM to carry out vulnerability investigation that carefully mimics the iterative, speculation-pushed strategy of human security professionals,” the researchers stated. “This architecture not only improves the agent’s capacity to identify and assess vulnerabilities but also makes sure that the outcomes are correct and reproducible.”

Observed this report exciting? Comply with us on Twitter  and LinkedIn to study far more unique material we publish.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «critical rce vulnerability discovered in ollama ai infrastructure tool Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
Next Post: Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts multiple wordpress plugins compromised: hackers create rogue admin accounts»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.