Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Reconnaissance appears in 1 case steps.
- 2Multiple attack methods. The case connects to 5 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The team first performed reconnaissance to gather information about the target ML model.
-
Resource Development The team identified and obtained the publicly available base model to use against the target ML model.
-
AI Model Access Using the publicly available version of the ML model, the team started sending queries and analyzing the responses (inferences) from the ML model.
-
AI Attack Staging
Step 4
Black-Box Optimization
The red team created an automated system that continuously manipulated an original target image, that tricked the ML model into producing incorrect inferences, but the perturbations in the image were unnoticeable to the human eye.
-
Impact
Step 5
Evade AI Model
Feeding this perturbed image, the red team was able to evade the ML model by causing misclassifications.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.