Google Pushes Software Security Via Rust, AI-Based Fuzzing

Google is making moves to help developers ensure that their code is secure.
The IT giant this week said it is donating $1 million to the Rust Foundation to improve interoperability between the Rust programming language and legacy C++ codebase in hopes of getting more developers make the shift to Rust.
The donation supports the foundation's new Interop Initiative to expand interoperability between the languages and make it easier for programmers to adopt Rust, one of a number of new languages - like Go, Python, and C# - that protect memory to reduce the number of vulnerabilities in software.
The donation to the Rust Foundation comes a week after Google said it was releasing its AI-based fuzzing framework as an open source resource.
The tool uses large-language models to help developers more quickly find vulnerabilities in their C and C++ projects.
In the fuzzing framework announcement, members of Google's security teams wrote that they also would show developers and researchers how they are using AI to accelerate the processing of patching those vulnerabilities.
CISA in December urged software makers to adopt newer memory-safe languages like Rust and create roadmaps for moving away from C and C++. In a report, the agency said such a shift would not only eliminate many of the most common vulnerabilities in languages but also migrate the responsibility for software security from users to developers, which CISA is promoting.
Google joined the foundation in 2021, by which time the language was being used with Android and other Google products, Bergstrom wrote in a blog post, stressing the need for memory-safe security.
Fuzzing is an automated process to test software for vulnerabilities and Google has been using its OSS-Fuzz tool since 2016.
Google used LLMs to write code specific to projects to boost coverage and find more vulnerabilities, the security team members wrote.
Google has used LLMs in more than 300 OSS-Fuzz C and C++ projects, which grew coverage across project codebases, and improved prompt generation and build pipelines, which further increased code line coverage by up to 29% in 160 projects.
Now Google is turning AI onto bug fixing, recently announcing an experiment that included building an automated pipeline that takes in vulnerabilities - including those found by fuzzing - and prompting LLMs to generate fixes and test them before choosing the best one to be reviewed by humans.
AI-powered patching fixed 15% of the bugs, which translated into significant time savings for engineers, according to Google, adding that the technology's benefits should benefit most steps throughout the software development process.
The open sourcing of the fuzzing framework means that any researcher or developer can use their own prompts to test how well fuzz targets generated by LLMs - including Google's VertexAI - fare.
Those interested in the use of LLMs to patch bugs can read Google's paper about it.


This Cyber News was published on securityboulevard.com. Publication date: Wed, 07 Feb 2024 19:13:04 +0000


Cyber News related to Google Pushes Software Security Via Rust, AI-Based Fuzzing

Google Pushes Software Security Via Rust, AI-Based Fuzzing - Google is making moves to help developers ensure that their code is secure. The IT giant this week said it is donating $1 million to the Rust Foundation to improve interoperability between the Rust programming language and legacy C++ codebase in ...
5 months ago Securityboulevard.com
Web fuzzing: Everything you need to know - Web applications are attractive targets for criminal hackers eager to access the underlying data stored on an organization's site, and by extension, the company's internal network. Web fuzzing enables security teams - and malicious hackers - to ...
6 months ago Techtarget.com
FLOSS for Gophers and Crabs: Extracting Strings from Go and Rust Executables - To support the static analysis of Go and Rust executables, FLOSS now extracts program strings using enhanced algorithms. Where traditional extraction algorithms provide compound and confusing string output FLOSS recovers the individual Go and Rust ...
6 months ago Mandiant.com
Critical Rust Flaw Poses Exploit Threat in Specific Windows Use Cases - The Rust Project has issued an update for its standard library, after a vulnerability researcher discovered a specific function used to execute batch files on Windows systems could be exploited using an injection flaw. The set of common functions ...
2 months ago Darkreading.com
Google Contributes $1 Million to Rust, Says It Prevented Hundreds of Android Vulnerabilities - Google today announced a grant of $1 million to the Rust Foundation, meant to help improve the interoperability between Rust and C++ code. The internet giant joined the Rust Foundation in 2021, for the same reason, and has adopted the memory-safe ...
5 months ago Securityweek.com
Google throws $1m at Rust Foundation to build C++ bridges The Register - Google on Monday donated $1 million to the Rust Foundation specifically to improve interoperability between the language and C++. C++, a popular general purpose programming language, has arguably fallen out of fashion due to concerns over safety. ...
5 months ago Go.theregister.com
Google Cloud Next 2024: New Data Center Chip Joins Ecosystem - Google Cloud announced a new enterprise subscription for Chrome and a bevy of generative AI add-ons for Google Workspace during the Cloud Next '24 conference, held in Las Vegas from April 9 - 11. Overall, Google Cloud is putting its Gemini generative ...
2 months ago Techrepublic.com
CVE-2019-16760 - Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and ...
4 years ago
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
1 week ago Crowdstrike.com
McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
5 months ago Americansecuritytoday.com
Ahead of Regulatory Wave: Google's Pivotal Announcement for EU Users - Users in the European Union will be able to prevent Google services from sharing their data across different services if they do not wish to share their data. Google and five other large technology companies must comply with the EU's Digital Markets ...
5 months ago Cysecurity.news
Researchers Claim Design Flaw in Google Workspace Puts Organizations at Risk - Google is disputing a security vendor's report this week about an apparent design weakness in Google Workspace that puts users at risk of data theft and other potential security issues. According to Hunters Security, a flaw in Google Workspace's ...
7 months ago Darkreading.com
Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling - In the ever-evolving landscape of software development, it's become absolutely paramount to ensure robust security measures throughout the Software Development Lifecycle. Each of these have illuminated different vulnerabilities that can be exploited ...
6 months ago Securityboulevard.com
What Is Software Piracy? - Software piracy has become a worldwide issue, with China, the United States and India being the top three offenders. In 2022, 6.2% of people worldwide visited software piracy websites. Software piracy doesn't require a hacker or skilled coder. Any ...
7 months ago Pandasecurity.com
CVE-2023-30624 - Wasmtime is a standalone runtime for WebAssembly. Prior to versions 6.0.2, 7.0.1, and 8.0.1, Wasmtime's implementation of managing per-instance state, such as tables and memories, contains LLVM-level undefined behavior. This undefined behavior ...
1 year ago
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
DevSecOps: Definition, Benefits and Best Practices - DevSecOps is an approach that focuses on the alignment of the three core pillars of DevOps — Development, Operations, and Security. It’s a combination of processes, tools and practices designed to enable organizations to adopt innovative and ...
1 year ago Heimdalsecurity.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
6 months ago Darkreading.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
6 months ago Darkreading.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
7 months ago Microsoft.com
CyberProof Announces Strategic Partnership With Google Cloud - PRESS RELEASE. ALISO VIEJO, Calif. and BENGALURU, India, May 6, 2024 /PRNewswire/ - CyberProof, a UST company, has announced an extended partnership with Google Cloud focused on leveraging Google Chronicle Security Operations and other Google Cloud ...
1 month ago Darkreading.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
The Crucial Need for a Secure Software Development Lifecycle in Today's Digital Landscape - In today's increasingly digital world, software is the backbone of business operations, from customer-facing applications to internal processes. The rapid growth of software development has also made organizations more vulnerable to security threats. ...
5 months ago Cyberdefensemagazine.com
Versions 14 and 13 of Android are Vulnerable to New Lock Screen Bypass Exploits - Using Android 14 and 13 smartphones, a newly discovered bug allowing the user to bypass the lock screen can compromise sensitive information from Google accounts stored in users' Google accounts, according to security researcher Jose Rodriguez. It ...
6 months ago Cysecurity.news
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)