APromptRiskDBThreat intelligence atlas
AI Security Technique

White-Box Optimization - AI Security Technique

In White-Box Optimization, the adversary has full access to the target model and optimizes the adversarial example directly. Adversarial examples trained in this manner are most effective against the target model.

AI Security Techniquedemonstrated

Record summary

A quick snapshot of what this page covers.

Tactics0Attacker goals connected to this method.
Mitigations6Defenses that may help against this attack.
AI risks0Research-backed risks connected to this topic.

Attack context

How this AI attack works in practice.

ATLAS ID
AML.T0043.000
Priority score
58
Maturity: demonstrated

Mitigations

Defenses that may help against this attack.

AML.M0015 - Adversarial Input Detection

Data PreparationML Model Engineering+3 more
LifecycleData Preparation + 4 moreCategoryTechnical - ML

Incorporate adversarial input detection to block malicious inputs at inference time.

AML.M0005 - Control Access to AI Models and Data at Rest

Business and Data UnderstandingData Preparation+2 more
LifecycleBusiness and Data Understanding + 3 moreCategoryPolicy

Access controls can reduce unnecessary access to AI models and prevent an adversary from achieving white-box access.

AML.M0010 - Input Restoration

Data PreparationML Model Evaluation+2 more
LifecycleData Preparation + 3 moreCategoryTechnical - ML

Input restoration can help remediate adversarial inputs.

AML.M0003 - Model Hardening

Data PreparationML Model Engineering
LifecycleData Preparation + 1 moreCategoryTechnical - ML

Hardened models are more robust to adversarial inputs.

AML.M0006 - Use Ensemble Methods

ML Model Engineering
LifecycleML Model EngineeringCategoryTechnical - ML

Using an ensemble of models increases the difficulty of crafting effective adversarial data and improves overall robustness.

Case studies

Examples from public reports and exercises.

Face Identification System Evasion via Physical Countermeasures

exercise
Date2020-01-01

MITRE's AI Red Team demonstrated a physical-domain evasion attack on a commercial face identification service with the intention of inducing a targeted misclassification. This operation had a combination of traditional MITRE ATT&CK techniques such as finding valid accounts and executing code via an API - all interleaved with adversarial ML specific attacks.

Microsoft Azure Service Disruption

exercise
Date2020-01-01

The Microsoft AI Red Team performed a red team exercise on an internal Azure service with the intention of disrupting its service. This operation had a combination of traditional ATT&CK enterprise techniques such as finding valid account, and exfiltrating data -- all interleaved with adversarial ML specific steps such as offline and online evasion examples.

Source

Where this page information comes from.