category
AI Security Techniques
Ways AI systems can be attacked or misused, with examples and defenses.
Showing 41-60 of 170 records
Spearphishing via Social Engineering LLM is AI attack method AML.T0052.000 with evidence level: demonstrated. It includes 2 mitigations; 1 case study.
Discover AI Model Ontology is AI attack method AML.T0013 with evidence level: demonstrated. It includes 2 mitigations; 1 case study.
Train Proxy via Gathered AI Artifacts is AI attack method AML.T0005.000 with evidence level: demonstrated. It includes 2 mitigations; 1 case study.
Escape to Host is AI attack method AML.T0105 with evidence level: demonstrated. It includes 2 case studies.
Deploy AI Agent is AI attack method AML.T0103 with evidence level: realized. It includes 1 case study.
Generate Malicious Commands is AI attack method AML.T0102 with evidence level: realized. It includes 1 case study.
AI Service API is AI attack method AML.T0096 with evidence level: realized. It includes 1 case study.
Manipulate User LLM Chat History is AI attack method AML.T0092 with evidence level: demonstrated. It includes 2 case studies.
Credentials from AI Agent Configuration is AI attack method AML.T0083 with evidence level: demonstrated. It includes 2 case studies.
Corrupt AI Model is AI attack method AML.T0076 with evidence level: realized. It includes 1 case study.
Cloud Service Discovery is AI attack method AML.T0075 with evidence level: realized. It includes 1 case study.
System Instruction Keywords is AI attack method AML.T0069.001 with evidence level: demonstrated. It includes 2 case studies.
Special Character Sets is AI attack method AML.T0069.000 with evidence level: demonstrated. It includes 2 case studies.
Command and Scripting Interpreter is AI attack method AML.T0050 with evidence level: demonstrated. It includes 2 case studies.
Data from Information Repositories is AI attack method AML.T0036 with evidence level: realized. It includes 1 case study.
Obtain Capabilities is AI attack method AML.T0016 with evidence level: realized. It includes 1 case study.
Consumer Hardware is AI attack method AML.T0008.001 with evidence level: realized. It includes 1 case study.
Search Open AI Vulnerability Analysis is AI attack method AML.T0001 with evidence level: demonstrated. It includes 2 case studies.
RAG Databases is AI attack method AML.T0085.000 with evidence level: demonstrated. It includes 4 mitigations; 1 case study.
Discover LLM Hallucinations is AI attack method AML.T0062 with evidence level: demonstrated. It includes 4 mitigations; 1 case study.