NetRise Trace utilizes AI to Identify compromised software assets
NetRise has released Trace in the NetRise platform. This new solution allows users to identify and validate compromised and vulnerable third-party and proprietary software assets using AI-powered semantic search for the first time.
Trace revolutionizes vulnerability detection and validation by introducing intent-driven searches, allowing users to search their assets based on the underlying motives or purposes behind the code and configurations that lead to vulnerabilities rather than solely relying on signature-based methods.
Rather than searching for specific code patterns or known vulnerabilities, users can query the system based on the intent of malicious actors or negligent developers. Such a method captures a wider range of software packages, misconfigurations, or unidentified flaws. Trace highlights affected assets, files, and packages utilizing natural language, mapping their intricate relationships across the entire software supply chain without the need for a scanning mechanism.
“Identifying issues in XIoT devices and their components has been an especially challenging problem,” said Michael Scott, CTO and Chief Scientist of NetRise. “This product release represents a significant advancement in product security and streamlines the detection and resolution of issues in complex systems. Moreover, it changes how NetRise customers discover and address issues more generally, with AI as a key driver in process enhancements.”
Trace integrates AI-driven semantic search, supply chain impact analysis, and vulnerability validation utilizing large language model (LLM) capabilities, which offer customers a unified solution to detect known and hidden threats in low-level firmware and other cyber-physical systems.
Key enhancements and capabilities of the new Trace solution in the NetRise Platform include:
- AI-powered search: Semantic and keyword-based search for all files, operating system configurations, and vulnerabilities across all assets using AI.
- Supply chain introspection & origin tracing: Discover and trace the origin of code and risk back to the third-party or proprietary software packages that introduced it across all assets.
- LLM-based vulnerability discovery & validation: Identify vulnerabilities and gauge their impact in the software supply chain using code-based or broad natural language queries, validating issues across an organization’s firmware, software, and cyber-physical systems.
Supply chain compromises are increasing, often targeting firmware or open-source software packages through dependency poisoning and other attacks. A widespread effort across numerous industries, involving both public and private sectors, is underway to discern which assets, devices, and software contain compromised software packages and vulnerabilities. The complexity of analyzing device firmware and build artifacts further exacerbates this challenge.
NetRise addresses these challenges by enabling organizations to trace all impacted assets using a single query. Upon identifying a positive match, it generates a comprehensive graph of the affected software supply chain components, eliminating the need for repeated scans or asset reprocessing. This approach is essential in discerning the extent of threats — from nation-state actors to inherent vulnerabilities and inadequate development practices — across devices, firmware, and software packages.