Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. AI Model Access appears in 2 case steps.
- 2Multiple attack methods. The case connects to 10 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance The team first performed reconnaissance to gather information about the target ML model.
-
Initial Access
Step 2
Valid Accounts
The team gained access to the commercial face identification service and its API through a valid account.
-
AI Model Access The team accessed the inference API of the target model.
-
Discovery The team identified the list of identities targeted by the model by querying the target model's inference API.
-
Resource Development
Step 5
Datasets
The team acquired representative open source data.
-
AI Attack Staging
Step 6
Create Proxy AI Model
The team developed a proxy model using the open source data.
-
AI Attack Staging
Step 7
White-Box Optimization
Using the proxy model, the red team optimized adversarial visual patterns as a physical domain patch-based attack using expectation over transformation.
-
Resource Development
Step 8
Physical Countermeasures
The team printed the optimized patch.
-
AI Model Access The team placed the countermeasure in the physical environment to cause issues in the face identification system.
-
Impact
Step 10
Evade AI Model
The team successfully evaded the model using the physical countermeasure by causing targeted misclassifications.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.