APromptRiskDBThreat intelligence atlas
AI Security Technique

Manipulate AI Model - AI Security Technique

Adversaries may directly manipulate an AI model to change its behavior or introduce malicious code. Manipulating a model gives the adversary a persistent change in the system. This can include poisoning the model by changing its weights, modifying the model architecture to change its behavior, and embedding malware which may be executed when the model is loaded.

AI Security TechniquerealizedAI Attack StagingPersistence

Record summary

A quick snapshot of what this page covers.

Tactics2Attacker goals connected to this method.
Mitigations3Defenses that may help against this attack.
AI risks12Research-backed risks connected to this topic.

Attack context

How this AI attack works in practice.

ATLAS ID
AML.T0018
Priority score
99
Maturity: realized
AI Attack StagingPersistence

Mitigations

Defenses that may help against this attack.

AML.M0013 - Code Signing

Deployment
LifecycleDeploymentCategoryTechnical - Cyber

Code signing provides a guarantee that the model has not been manipulated after signing took place.

AML.M0008 - Validate AI Model

ML Model EvaluationMonitoring and Maintenance
LifecycleML Model Evaluation + 1 moreCategoryTechnical - ML

Validating an AI model against a wide range of adversarial inputs can help increase confidence that the model has not been manipulated.

Case studies

Examples from public reports and exercises.

No case studies found. No public example is connected to this attack in the current data.

Source

Where this page information comes from.