A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Exploitation as an inference problem
2011
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
In this position paper, we suggest that an adversary seeking to exploit a side channel should be viewed as performing inference under uncertainty. We propose a set of vulnerability measures that incorporate both observational effort and computational effort. By deriving Boolean satisfiability as a special case of the marginalization problem, we justify that the measure is capable of capturing the complexity of the underlying deterministic decision problem. In the limit of unbounded computation
doi:10.1145/2046684.2046702
dblp:conf/ccs/Cock11
fatcat:qzbi3g5v2rhqffmxnyahgyusp4