Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 4 case steps.
- 2Multiple attack methods. The case connects to 6 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Resource Development
Step 1
Datasets
The researchers download a web-scale dataset, which consists of URLs pointing to individual datapoints.
-
Resource Development
Step 2
Domains
They identify expired domains in the dataset and purchase them.
-
Resource Development
Step 3
Poison Training Data
An adversary could create poisoned training data to replace expired portions of the dataset.
-
Resource Development An adversary could then upload the poisoned data to the domains they control. In this particular exercise, the researchers track requests to the URLs they control to track downloads to demonstrate there are active users of the dataset.
-
Impact
Step 5
Erode Dataset Integrity
The integrity of the dataset has been eroded because future downloads would contain poisoned datapoints.
-
Impact
Step 6
Erode AI Model Integrity
Models that use the dataset for training data are poisoned, eroding model integrity. The researchers show as little as 0.01% of the data needs to be poisoned for a successful attack.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.