'A world where software vulnerabilities are the exception': In conversation with Dr. Kathleen Fisher
Critical infrastructure is facing threats from ever more sophisticated cyber-attacks, and defenses are struggling to cope. The US Military’s advanced research division thinks AI could be key to boosting national security.

The Inference:
- Legacy software vulnerabilities in computer systems used in critical infrastructure make a tempting target for malicious threat actors who want to cause disruption.
- DARPA believes AI-driven cybersecurity could improve national security by enhancing defenses against malicious cyber threats.
- The agency's AI Cyber Challenge brings together the brightest in AI and cybersecurity to design novel AI systems to secure critical code - with millions in prize money awarded to the winners.
“We’re called the mad scientists of the Defense Department,” laughs Dr. Kathleen Fisher, director of the Information Innovation Office (I2O) at Defense Advanced Research Projects Agency (DARPA).
Founded by President Eisenhower in 1958 in response to the Soviet Union launching Sputnik 1 – the first artificial satellite sent into orbit around the Earth – DARPA’s singular mission has endured for over 60 years; to make pivotal investments in breakthrough technologies for national security.
Working with scientists, technologists and innovators both inside and outside the agency, over the decades DARPA has been responsible for developing many novel technologies that have gone on to become some of the most important technologies used in society.
Perhaps the most significant of these research projects started in the 1960s, when the Advanced Research Projects Agency (ARPA)– as the agency was then known – began work on ARPANET – a network for sharing digital resources among geographically separated computers. It laid the technical foundations for the internet as we know it today.
And DARPA continues to look towards the future by examining cutting edge technology and how it can be applied to national security.
“Our job is to create and prevent strategic surprise by looking over the horizon for disruptive technology in places where we can completely change the conversation and direction of what might be happening. It’s very high-risk, high reward work that other agencies wouldn’t take on,” Dr. Fisher explains.
“The range of the scope is anything to do with national security in the science and disruption space. Anything from how we build better aircraft to how we build better computers, or vaccines,” she adds.








Many of the innovations that we rely on today began as innovation projects at DARPA...
1962: oN-Line System (NLS)
A groundbreaking computer framework, oN-Line System (NLS) was the first computer feature hypertext links, a mouse, raster-scan video monitors, information organized by relevance, screen windowing, presentation programs and other concepts used widely in computing today. Conceived by Douglas Engelbart and colleagues at the Stanford Research Institute (SRI), the initial funding came from DARPA and the U.S. Air Force.
1969: ARPANET
The Advanced Research Projects Agency Network (ARPANET) was a pioneering network for sharing digital resources among geographically separated computers It was the first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite - this technology was the forerunner to the internet as we know it today.
1983: Mini GPS Receivers
Developed in an effort to lighten the load of what Marine Corps carried in the field, DARPA helped to develop a gallium arsenide hybrid chip that allowed for combined analog and digital functionality and the first “all-digital” GPS receivers.
They allowed for better communication and better strategy on the battlefield - and went on to form the basis of the GPS our smartphones use to help get us around today.
1997: Head-Mounted Displays
With an eye towards the future of computing, the late 90s saw DARPA start work on head-mounted displays to provide soldiers with additional information to operate in complex environments. The work kick-started what's still a vibrant area of R&D today - for both military and civilian use.
2002: Personal Assistant That Learns (PAL)
DARPA's Personal Assistant That Learns (PAL) program created cognitive computing systems to make military decision-making more efficient and more effective with the technology eventually embedded into many military systems.
The technology was also deployed in non-military environments, leading to the launch of Siri Inc. in 2007. Later acquired by Apple, PAL's descendent Siri has become a core element of iPhone technology and how smartphones are used.
2013: Atlas Robot
Developed for DARPA by Boston Dynamics as part of DARPA Robotics Challenge (DRC), a prize competition intended to speed the development of advanced robotic hardware, software, sensors and control interfaces so that robots might assist humans in responding to future natural and man-made disasters. At the time of its debut, ATLAS was one of the most advanced humanoid robots ever built - and Boston Dynamics have continued to improve their designs in the years since.
Check out the full innovation timeline here.
Credit: darpa.mil
Credit: darpa.mil
While DARPA's mission is to push the boundaries of science and technology, it must be within the realm of reason, based on what’s potentially achievable with the technology of the day.
“Transporter tech from Star Trek is the example I often give; it’s something that would be really easy to make the case for why DARPA should do it, but we have a pretty good idea that it’s just not possible,” says Dr. Fisher.
Something DARPA is examining is AI-driven cybersecurity and how it can be used to enhance defenses against malicious cyber threat actors who wish to disrupt critical infrastructure and other systems vital to national security.
It’s this effort which is being led by Dr. Fisher, who is also a professor of Computer Science at Tufts University in Medford, Massachusetts, and a specialist in programming languages and their implementation. It’s her second role at DARPA, having previously served as a program manager on projects around high-assurance computing and machine learning from 2011 to 2014.
Typically, DARPA project managers only serve for short periods – typically three to five years – a system that’s designed to generate urgency to achieve success in less time than might be considered reasonable outside the Department of Defense. That means that at some point, Dr. Fisher will once again move on.
But for now, she’s focused on examining how AI can be used to improve cybersecurity of critical software – and setting some high targets for success.
“The grand vision is a world where software vulnerabilities are way harder to exploit; that it’s the exception rather than the norm,” Dr. Fisher explains.
“There’s this learned helplessness of ‘of course software is just helplessly vulnerable, and we just wait for the next bad guy to exploit it and that’s just the way it is’ – but we know how to build software to much higher standards, we are just choosing not to at this point.”
"The grand vision is a world where software vulnerabilities are way harder to exploit; that it’s the exception rather than the norm."

The thinking is that a lot of software development still relies on pushing out the product or update as quickly as possible, without appropriate thought given to testing and security – and that’s following a pattern which has been used in coding software for decades. DARPA wants to combat these legacy issues with the aid of AI.
“The motivation is the massive technical debt that we have accrued,” says Dr. Fisher.
“Part of the need to marry AI technology with cyber reasoning systems and traditional program analysis tools for finding vulnerabilities is just the sheer scale of the problem.”
“We can’t really rely on traditional techniques because we really need to find and fix vulnerabilities at scale; just finding the problems by themselves isn’t enough, we need to be able to fix them,” she adds.
Cybersecurity vulnerabilities in software affect every sector, but one which DARPA is thinking about is critical infrastructure.
The Cybersecurity & Infrastructure Security Agency (CISA) classes the systems and networks of 16 sectors as critical infrastructure – including communications, energy, food and agriculture, healthcare and water – on the basis that they’re "considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security [or] national public health or safety."
The 16 critical infrastructure sectors CISA classes as 'vital'
However, a lot of the technology that powers vital critical infrastructure – utilities in particular – runs on software that is vulnerable to cyber-attacks, either because patching the systems is too difficult, or because the software simply isn’t actively supported anymore.
“There’s lots of critical infrastructure areas and many of them are significantly underfunded. Being able to go to those sectors with solutions would be useful, especially the potential to not just find problems, but fix them,” says Dr. Fisher.
The desire to find an answer to this persistent challenge is the reason the agency launched the DARPA AI Cyber Challenge (AIxCC) in 2023.
The aim of the two-year competition is to bring together the best and brightest in AI and cybersecurity to design novel AI systems to secure critical code – with a total of $29.5 million in prizes awarded to the teams with the best systems.
The significant value of the prize money arguably demonstrates how important an issue the security of critical infrastructure is deemed to be. While critical infrastructure is vital to society, sometimes the budget – or motivation – isn’t there to ensure it is secure against malicious cyber threats.
But according to Dr. Fisher, not fixing the vulnerabilities will be a more expensive problem – and more damaging to society – in the long run.
"The cost of not fixing these vulnerabilities is very, very high. And it’s just going to get higher and higher," she argues.
DARPA hopes to provide a solution for this; and the agency believes harnessing AI could be the answer, which is why it’s running the DARPA AI Cyber Challenge (AIxCC).
"We’re not properly accounting for the full cost of not fixing these cyber vulnerabilities."

For the AIxCC semi-final, teams - of which there were nearly 40 - were tasked with developing a Cyber Reasoning System, automatous software which can automatically identify and patch security vulnerabilities. These were tested against a set of Challenge Projects, designed and evaluated by experts and identical for each team.
Each of these Challenge Projects was based on a real-world, open-source project critical to infrastructure, national security or society and each contained vulnerabilities for the teams’ cyber reasoning systems to identify and secure.
All of this took place an environment built specifically for the contest at DEF CON 32; the immersive, interactive environment not only showcased live progress and scores in the competition, but it was also designed to look like a city and its utility providers– and to showcase the potential disruptive impact cyber-attacks could have on that environment to the thousands of DEF CON attendees who visited the contest.
The AIxCC stage was designed to look like a near-future connected city. (Photo: DARPA)
The AIxCC stage was designed to look like a near-future connected city. (Photo: DARPA)
“The stage was a mock city where we demonstrate the effects of a cyber-attack on critical infrastructure,” Dr. Fisher explains.
“The purpose was to create a visceral appreciation of the impact of cyber-attacks on critical infrastructure; it’s not just stealing people’s data. We wanted to drive home how important it is to pay down technical debt and produce an appreciation of what a cyber-attack could do to a city.”
Incidents like December 2015 cyber-attack against Ukrainian power companies – an attack later attributed to the Russian nation-state threat actors, which resulted in power outages in the freezing temperatures of winter – show the impact an attack on critical infrastructure can have on civilians.
The environment built for DEF CON in Las Vegas aimed to highlight the type of disruption a cyber-attack on critical infrastructure could cause closer to home.
Christopher Way, Director of the FBI. (Photo: FBI)
Christopher Way, Director of the FBI. (Photo: FBI)
But this isn’t just an impossible, theoretical scenario.
In January, FBI Director Christoper Wray told the House Select Committee that threat actors working on behalf of China were preparing to “wreak havoc and cause real-world harm” with attacks targeting critical infrastructure.
“And let’s be clear: Cyber threats to our critical infrastructure represent real world threats to our physical safety,” he added at the time.
The FBI’s warnings were echoed during the same hearing by CISA Director Jen Easterly.
“While the PRC is a sophisticated cyber adversary, many of its methods to break into our critical infrastructure are not. They don’t have to be. Why? Because we’ve made it easy for them. The truth is that, in many cases, the PRC is taking advantage of known product defects,” she said in prepared remarks.
“Unfortunately, the technology base underpinning much of our critical infrastructure is inherently insecure, because for decades software developers have been insulated from responsibility for defects in their products. This has led to misaligned incentives that prioritize features and speed to market over security, leaving our nation vulnerable to cyber invasion. That must stop,” she added.
CISA Director Jen Easterly (Photo: CISA)
CISA Director Jen Easterly (Photo: CISA)
For Dr. Fisher, the scale of the problem is clear, making it vital to secure the software behind critical infrastructure – potentially, if AIxCC is successful, with the aid of AI.
She points to the global Windows outage caused by a malfunction in a CrowdStrike software update as an example of what could be the scenario if a malicious hacking operation got inside critical infrastructure.
The Microsoft outage caused by a faulty Crowdstrike software update affected critical services around the world. Photo by Shekai on Unsplash.
The Microsoft outage caused by a faulty Crowdstrike software update affected critical services around the world. Photo by Shekai on Unsplash.
The update affected millions of systems around the world, causing flights to be cancelled, healthcare appointments to be rescheduled and payment systems to temporarily stop working, among other things. And it was caused by an error – a malicious attack might be much worse.
“If this is what a cyber update gone wrong can do. Well, what if an adversary was in those systems and wanted to have that happen? That’s the kind of thing that an adversary, if they were in that system, could make happen,” Dr. Fisher warns.
If attackers got inside critical infrastructure, like power plants, water plants or turbines, the outcome could have physical and catastrophic consequences, warns Dr. Fisher.
“There are also terrorist activists, anarchists and other actors – and the technology is making it easier and easier for smaller numbers of people to do this stuff. All to say, we should get our defenses into a much better state, so this is much harder to do,” she adds.
Dr Kathleen Fisher's official DARPA portrait. (Photo: DARPA)
Dr Kathleen Fisher's official DARPA portrait. (Photo: DARPA)
Dr Kathleen Fisher's official DARPA portrait. (Photo: DARPA)
Dr Kathleen Fisher's official DARPA portrait. (Photo: DARPA)
Dr Kathleen Fisher's official DARPA portrait. (Photo: DARPA)
Dr Kathleen Fisher's official DARPA portrait. (Photo: DARPA)
It’s because of the potential of threats like this that the DARPA AI Cyber Challenge is encouraging the use of AI-driven cybersecurity to help protect against malicious cyber threats.
Seven teams qualified from the semi-finals and they’ve each been awarded $2 million to help mature their technology ahead of the AIxCC Final Competition in August 2025.
The seven teams which qualified for the AI Cyber Challenge final. (Photo: DARPA)
The seven teams which qualified for the AI Cyber Challenge final. (Photo: DARPA)
The ultimate aim is to accelerate and facilitate the availability of software to find and patch vulnerabilities and defend what DARPA describes as “the software that enables modern life” – it’s a challenge which Dr. Fisher is excited to work on.
“I think it’s super exciting, because the size of the problem is enormous. AI offers a really promising possible solution in the future to find and fix vulnerabilities at speed and scale,” she says.
There is no silver bullet
However, there’s also the understanding that this won’t be a silver bullet – vulnerabilities won’t just cease to exist.
“There’s no such thing as perfect security,” Dr. Fisher points out. “But we could be substantially more secure than we are now - and we need to be prioritizing security significantly more than we have been.”
If DARPA’s hypothesis is correct, the AI Cyber Challenge could be the catalyst for a world with critical infrastructure that is more secure against cyber-attacks because AI is being leveraged to help find and remediate security vulnerabilities.
"We have technology that has developed that we should be applying more aggressively than we have been. And by applying AI, we have the promise of applying it at a speed and scale that we haven’t been able to do in the past."