Command Palette

Search for a command to run...

PodMine
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis•December 24, 2025

The Great Security Update: AI ∧ Formal Methods with Kathleen Fisher of RAND & Byron Cook of AWS

Kathleen Fisher and Byron Cook explore how formal methods and AI can work together to create more secure software systems, demonstrating how automated reasoning and proof techniques can help address emerging cybersecurity challenges and potentially enable a "great software rewrite" that dramatically reduces vulnerabilities.
AI & Machine Learning
Tech Policy & Ethics
Developer Culture
Cybersecurity
Kathleen Fisher
Byron Cook
Amazon
AWS

Summary Sections

  • Podcast Summary
  • Speakers
  • Key Takeaways
  • Statistics & Facts
  • Compelling StoriesPremium
  • Thought-Provoking QuotesPremium
  • Strategies & FrameworksPremium
  • Similar StrategiesPlus
  • Additional ContextPremium
  • Key Takeaways TablePlus
  • Critical AnalysisPlus
  • Books & Articles MentionedPlus
  • Products, Tools & Software MentionedPlus
0:00/0:00

Timestamps are as accurate as they can be but may be slightly off. We encourage you to listen to the full context.

0:00/0:00

Podcast Summary

This episode explores the intersection of AI and cybersecurity with two leading experts in formal methods and automated reasoning. Kathleen Fisher, director of RAND's cybersecurity initiative and future CEO of UK's ARIA, and Byron Cook, Amazon VP and distinguished scientist, discuss how AI is reshaping cyber threats while simultaneously offering solutions through formal verification. (04:52) They explain how AI empowers attackers at every skill level but also enables defenders to build provably secure systems. (10:16)

  • Core focus: How formal methods can deliver mathematical guarantees about software behavior, moving beyond "security by obscurity" to systems that are provably correct and secure against entire classes of attacks.

Speakers

Kathleen Fisher

Kathleen Fisher is the director of the cybersecurity initiative at RAND Corporation and will become CEO of The UK's Advanced Research and Invention Agency (ARIA) in February 2025. She previously served as director of the Information Innovation Office at DARPA, where she led the groundbreaking High Assurance Cyber Military Systems (HACMS) project that demonstrated formally verified helicopter systems could resist sophisticated cyberattacks even during flight operations.

Byron Cook

Byron Cook is vice president and distinguished scientist at Amazon, where he has led the application of formal methods to distributed systems at AWS for over a decade. His work has been instrumental in maintaining AWS's strong security record despite being one of the world's largest targets for cyber attackers, including proving the correctness of AWS's policy interpreter that processes over a billion security decisions per second.

Key Takeaways

AI Threatens All Levels of Cybersecurity

AI is fundamentally changing the cybersecurity landscape by empowering attackers across the entire spectrum - from script kiddies to nation-state adversaries. (07:03) Fisher emphasizes that AI helps everyone "do better at cyber attacks" by providing assistance at all stages of the cyber kill chain. This isn't just about making existing hackers more effective; it's enabling entirely new categories of attackers who previously lacked the technical skills. The scale and parallel capabilities that AI provides to attackers represent a qualitative shift in the threat landscape that traditional security approaches cannot adequately address.

Formal Methods Provide Mathematical Guarantees

Formal methods offer a fundamentally different approach to cybersecurity by providing mathematical proofs about software behavior rather than probabilistic defenses. (10:40) As Cook explains, it's "algorithmic search for proofs" that can reason about infinite possibilities in finite time. Unlike traditional security testing that can only check specific cases, formal verification can prove that certain classes of vulnerabilities simply cannot exist in properly verified code. This moves security from a game of whack-a-mole to establishing permanent mathematical guarantees.

Specification is the Hardest Challenge

The most difficult aspect of formal methods isn't the mathematical proving - it's defining what you actually want to prove. (49:49) Cook reveals he has "spent a lot of time in shuttle buses between buildings trying to get agreement amongst teams on did we get the spec right." Even simple concepts like "all data at rest is encrypted" require extensive refinement to define what constitutes "encryption," "data," and "at rest." This specification challenge has historically limited formal methods adoption, but AI is now helping bridge this gap by assisting in translating natural language policies into formal specifications.

AI Enables a "Great Software Rewrite"

Generative AI is revolutionizing formal methods by making proof generation dramatically more accessible and enabling a potential society-wide software rewrite. (1:13:23) Fisher explains that AI coding models can be trained to generate not just code, but secure code with formal guarantees. The combination creates a virtuous cycle: AI helps generate proofs and secure code, which becomes training data for even better AI systems. This suggests we could achieve "superhuman levels of code security" within the next generation or two of language models, potentially solving decades of accumulated technical debt.

Automated Reasoning Checks Enable Policy Compliance

AWS's Automated Reasoning Checks product demonstrates how formal methods can be applied to AI agent governance by translating natural language policies into formal specifications. (50:34) The system helps organizations iterate on policy formalization, then provides up to 99% verification accuracy for AI outputs against those policies. This approach tackles the "last mile" problem of AI democratizing access to information - making AI responses not just fast and cheap, but actually correct and trustworthy for critical decisions.

Statistics & Facts

  1. AWS's policy interpreter processes over one billion security decisions per second, and this critical infrastructure component has been formally verified for correctness. (47:05)
  2. In the HACMS helicopter demonstration, red team attackers had six weeks of preparation and full knowledge of the system, yet could not compromise the formally verified flight operations even during live flight with test pilots aboard. (35:56)
  3. The CompCert verified C compiler required approximately 100,000 lines of formal proof in Isabelle to verify 10,000 lines of C code - roughly a 10:1 ratio of proof to code. (32:02)

Compelling Stories

Available with a Premium subscription

Thought-Provoking Quotes

Available with a Premium subscription

Strategies & Frameworks

Available with a Premium subscription

Similar Strategies

Available with a Plus subscription

Additional Context

Available with a Premium subscription

Key Takeaways Table

Available with a Plus subscription

Critical Analysis

Available with a Plus subscription

Books & Articles Mentioned

Available with a Plus subscription

Products, Tools & Software Mentioned

Available with a Plus subscription

More episodes like this

The James Altucher Show
January 14, 2026

From the Archive: Sara Blakely on Fear, Failure, and the First Big Win

The James Altucher Show
Tetragrammaton with Rick Rubin
January 14, 2026

Joseph Nguyen

Tetragrammaton with Rick Rubin
Finding Mastery with Dr. Michael Gervais
January 14, 2026

How To Stay Calm Under Stress | Dan Harris

Finding Mastery with Dr. Michael Gervais
In Good Company with Nicolai Tangen
January 14, 2026

Figma CEO: From Idea to IPO, Design at Scale and AI’s Impact on Creativity

In Good Company with Nicolai Tangen
Swipe to navigate