category
AI Security Techniques
Ways AI systems can be attacked or misused, with examples and defenses.
Showing 21-40 of 170 records
Search Open Websites/Domains is AI attack method AML.T0095 with evidence level: demonstrated. It includes 1 case study.
Application Access Token is AI attack method AML.T0091.000 with evidence level: demonstrated. It includes 1 case study.
OS Credential Dumping is AI attack method AML.T0090 with evidence level: demonstrated. It includes 1 case study.
Process Discovery is AI attack method AML.T0089 with evidence level: demonstrated. It includes 1 case study.
Activation Triggers is AI attack method AML.T0084.002 with evidence level: demonstrated. It includes 1 case study.
Embedded Knowledge is AI attack method AML.T0084.000 with evidence level: demonstrated. It includes 1 case study.
False RAG Entry Injection is AI attack method AML.T0071 with evidence level: demonstrated. It includes 1 case study.
System Prompt is AI attack method AML.T0069.002 with evidence level: demonstrated. It includes 1 case study.
Citations is AI attack method AML.T0067.000 with evidence level: demonstrated. It includes 1 case study.
LLM Trusted Output Components Manipulation is AI attack method AML.T0067 with evidence level: demonstrated. It includes 1 case study.
Publish Hallucinated Entities is AI attack method AML.T0060 with evidence level: demonstrated. It includes 1 case study.
Malicious Link is AI attack method AML.T0011.003 with evidence level: demonstrated. It includes 1 case study.
Physical Countermeasures is AI attack method AML.T0008.003 with evidence level: demonstrated. It includes 1 case study.
AI Development Workspaces is AI attack method AML.T0008.000 with evidence level: demonstrated. It includes 1 case study.
AI Agent Configuration is AI attack method AML.T0002.002 with evidence level: demonstrated. It includes 1 case study.
Pre-Print Repositories is AI attack method AML.T0000.001 with evidence level: demonstrated. It includes 1 case study.
AI Supply Chain Reputation Inflation is AI attack method AML.T0111 with evidence level: demonstrated. It includes 1 case study; 1 related AI risk.
Data from AI Services is AI attack method AML.T0085 with evidence level: demonstrated. It includes 5 mitigations.
Container Registry is AI attack method AML.T0010.004 with evidence level: demonstrated. It includes 1 case study; 1 related AI risk.
RAG Credential Harvesting is AI attack method AML.T0082 with evidence level: demonstrated. It includes 2 mitigations; 1 case study.