APromptRiskDBThreat intelligence atlas
AI Case Study

Face Identification System Evasion via Physical Countermeasures - AI Case Study

MITRE's AI Red Team demonstrated a physical-domain evasion attack on a commercial face identification service with the intention of inducing a targeted misclassification. This operation had a combination of traditional MITRE ATT&CK techniques such as finding valid accounts and executing code via an API - all interleaved with adversarial ML specific attacks.

ExerciseCommercial Face Identification ServiceMITRE AI Red TeamAI Model AccessResource DevelopmentAI Attack Staging

Overview

Case steps10Steps described in the case record.
Techniques10Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. AI Model Access appears in 2 case steps.
  • 2Multiple attack methods. The case connects to 10 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

AI Model Access2Resource Development2AI Attack Staging2Reconnaissance1Initial Access1Discovery1Impact1
  1. Initial Access

    The team gained access to the commercial face identification service and its API through a valid account.

  2. AI Attack Staging

    Using the proxy model, the red team optimized adversarial visual patterns as a physical domain patch-based attack using expectation over transformation.

  3. Impact

    The team successfully evaded the model using the physical countermeasure by causing targeted misclassifications.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.