Skip to main content

Currently Skimming:

2 Securing the Internet of Things
Pages 6-10

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 6...
... "Futurists are laying the groundwork for a civilization in which every perceived human moment is mediated and assisted by a networked computer." All these networked applications of computers will need to be protected from malicious actors, Walker pointed out. Today, 24-hour security operations centers staffed by specialized analysts are ­ etecting d attacks, diagnosing security faults, managing incidents, and keeping mission-critical services running on servers, desktops, laptops, and 6
From page 7...
... When they are scattered throughout the world in the billions, security operations centers as they currently exist will be helpless to manage intrusions. "The resulting mandate, quite simply, is automate or perish." A SECURITY ECOSYSTEM In the future, the devices needing protection will not be discrete, large, and complex central processing units (CPUs)
From page 8...
... This trusted core will embody everything learned in the past about creating armored software, said Walker. Using techniques such as randomized execution, attack surface reduction, formal verification, and automated auditing, it will remove security functions from the general purpose computer and enable it to run as fast as it can.
From page 9...
... DARPA challenged the systems with remixed versions of some of the most famous problems from the history of computer security. In a feat that was applauded by the security experts in attendance, an AI system known as Mayhem performed a world-class feat of bug hunting without any a priori knowledge of the bug or any access to the source code.
From page 10...
... These the structural disadvantages will provide unassailable intro of human defense." Artificial spection into workloads while AI intelligence "is going to give us devices defend against intrusions. the chance to level that playing field at last." The result will be something like a biological immune system, Walker explained in response to a question, in which attacks are identified, countered, and shared with others so they do not happen again.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.