category

AI Security Techniques

Ways AI systems can be attacked or misused, with examples and defenses.

Showing 21-40 of 170 records

Search Open Websites/Domains - AI Security Technique

Search Open Websites/Domains is AI attack method AML.T0095 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Application Access Token - AI Security Technique

Application Access Token is AI attack method AML.T0091.000 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
OS Credential Dumping - AI Security Technique

OS Credential Dumping is AI attack method AML.T0090 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Process Discovery - AI Security Technique

Process Discovery is AI attack method AML.T0089 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Activation Triggers - AI Security Technique

Activation Triggers is AI attack method AML.T0084.002 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Embedded Knowledge - AI Security Technique

Embedded Knowledge is AI attack method AML.T0084.000 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
False RAG Entry Injection - AI Security Technique

False RAG Entry Injection is AI attack method AML.T0071 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
System Prompt - AI Security Technique

System Prompt is AI attack method AML.T0069.002 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Citations - AI Security Technique

Citations is AI attack method AML.T0067.000 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
LLM Trusted Output Components Manipulation - AI Security Technique

LLM Trusted Output Components Manipulation is AI attack method AML.T0067 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Publish Hallucinated Entities - AI Security Technique

Publish Hallucinated Entities is AI attack method AML.T0060 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Malicious Link - AI Security Technique

Malicious Link is AI attack method AML.T0011.003 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Physical Countermeasures - AI Security Technique

Physical Countermeasures is AI attack method AML.T0008.003 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
AI Development Workspaces - AI Security Technique

AI Development Workspaces is AI attack method AML.T0008.000 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
AI Agent Configuration - AI Security Technique

AI Agent Configuration is AI attack method AML.T0002.002 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
Pre-Print Repositories - AI Security Technique

Pre-Print Repositories is AI attack method AML.T0000.001 with evidence level: demonstrated. It includes 1 case study.

May 19, 2026
AI Supply Chain Reputation Inflation - AI Security Technique

AI Supply Chain Reputation Inflation is AI attack method AML.T0111 with evidence level: demonstrated. It includes 1 case study; 1 related AI risk.

May 19, 2026
Data from AI Services - AI Security Technique

Data from AI Services is AI attack method AML.T0085 with evidence level: demonstrated. It includes 5 mitigations.

May 19, 2026
Container Registry - AI Security Technique

Container Registry is AI attack method AML.T0010.004 with evidence level: demonstrated. It includes 1 case study; 1 related AI risk.

May 19, 2026
RAG Credential Harvesting - AI Security Technique

RAG Credential Harvesting is AI attack method AML.T0082 with evidence level: demonstrated. It includes 2 mitigations; 1 case study.

May 19, 2026