Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Impact appears in 3 case steps.
- 2Multiple attack methods. The case connects to 9 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The researchers used published research papers to identify the datasets and model architectures used by the target translation services.
-
Resource Development
Step 2
Datasets
The researchers gathered similar datasets that the target translation services used.
-
Resource Development
Step 3
Models
The researchers gathered similar model architectures that the target translation services used.
-
AI Model Access They abused a public facing application to query the model and produced machine translated sentence pairs as training data.
-
AI Attack Staging Using these translated sentence pairs, the researchers trained a model that replicates the behavior of the target model.
-
Impact By replicating the model with high fidelity, the researchers demonstrated that an adversary could steal a model and violate the victim's intellectual property rights.
-
AI Attack Staging
Step 7
Black-Box Transfer
The replicated models were used to generate adversarial examples that successfully transferred to the black-box translation services.
-
Impact
Step 8
Evade AI Model
The adversarial examples were used to evade the machine translation services by a variety of means. This included targeted word flips, vulgar outputs, and dropped sentences.
-
Impact
Step 9
Erode AI Model Integrity
Adversarial attacks can cause errors that cause reputational damage to the company of the translation service and decrease user trust in AI-powered services.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.