This seems like a strictly easier task than discovering rowhammer or spectre.
(The hard part is discovering the vulnerability, not writing the code for the exploit assuming you had a one paragraph description.)
Have you read the wikipedia pages for these attacks? My intuition is they require first principles thinking to discover, you’re unlikely to stumble on them simply by generating a lot of data from the processor and searching for patterns in the data.
Can AI hack into LessWrong’s database?
This seems like a strictly easier task than discovering rowhammer or spectre.
(The hard part is discovering the vulnerability, not writing the code for the exploit assuming you had a one paragraph description.)
Have you read the wikipedia pages for these attacks? My intuition is they require first principles thinking to discover, you’re unlikely to stumble on them simply by generating a lot of data from the processor and searching for patterns in the data.