With the rapid incorporation of Internet-enabled technologies into our everyday lives, we no longer have direct control over with whom and what our devices communicate. Hacked devices acting on a network can cause significant damage and provide a new playground for attackers. The number of devices that run potentially vulnerable software has exploded, and vulnerabilities are increasingly being discovered in the software running on these devices. To keep up with the number of services that must be vetted for vulnerabilities, a new approach is required.