← Back

Our Compute Stack is Insecure but Fundamentally Doesn’t Have To Be

Insecure software can lead to vulnerabilities that undermine the reliability and safety of computational systems. Formal methods and rigorous verification are needed to synthesize secure software.

Foundational Capabilities (1)

Utilize formal verification techniques to synthesize software that is provably secure, reducing vulnerabilities and enhancing system robustness. Traditional programs in these areas have tended to assume that AI capabilities are saturating, leaving important avenues neglected.  Efforts could break down into several key components:  • Specification generation and validation tools • Code and proof generation systems • Tools that integrate formal verification into existing engineering workflows  • Practical formalization structures that facilitate real-world adoption