APromptRiskDBThreat intelligence atlas
AI Mitigation

AI Model Distribution Methods - AI Mitigation

Deploying AI models to edge devices can increase the attack surface of the system. Consider serving models in the cloud to reduce the level of access the adversary has to the model. Also consider computing features in the cloud to prevent gray-box attacks, where an adversary has access to the model preprocessing methods.

AI MitigationDeploymentPolicy

Record summary

A quick snapshot of what this page covers.

Techniques6Attacks this defense is designed to help with.
Lifecycle1Where this defense applies in the AI lifecycle.
Categories1How the source groups this defense.

Control summary

What this defense is meant to help prevent.

ATLAS ID
AML.M0017
Priority score
30
Deployment
Policy

Covered techniques

Attacks this defense is designed to help with.

AML.T0063 - Discover AI Model Outputs

demonstrated

Avoiding the deployment of models to edge devices reduces an adversary's ability to collect sensitive information about the model outputs.

AML.T0044 - Full AI Model Access

demonstrated

Not distributing the model in software to edge devices, can limit an adversary's ability to gain full access to the model.

AML.T0010.003 - Model

realized

An adversary could repackage the application with a malicious version of the model.

Source

Where this page information comes from.