The Feasibility and Inevitability of Stealth Attacks