Exploitation as an inference problem
Authors
UNSW
NICTA
Abstract
In this position paper, we suggest that an adversary seeking to exploit a side channel should be viewed as an AI system performing inference under uncertainty. We demonstrate that this allows us to place a practical bound on the adversary's ability to exploit the channel. Specifically, by ensuring that the Bayesian network corresponding to the associated inference problem has large tree-width, the problem of inferring the secret given the observations is #P-hard.
BibTeX Entry
@inproceedings{Cock_11, publisher = {ACM}, doi = {10.1145/2046684.2046702}, month = oct, paperurl = {https://ts.data61.csiro.au/publications/nicta_full_text/4872.pdf}, slides = {http://ts.data61.csiro.au/publications/nicta_slides/4872.pdf}, booktitle = {4th Workshop on Artificial Intelligence and Security}, year = {2011}, title = {Exploitation as an Inference Problem}, pages = {105--106}, author = {Cock, David}, address = {Chicago, IL, USA} }