category

AI Security Techniques

Ways AI systems can be attacked or misused, with examples and defenses.

Showing 61-80 of 170 records

LLM Data Leakage - AI Security Technique

LLM Data Leakage is AI attack method AML.T0057 with evidence level: demonstrated. It includes 4 mitigations; 1 case study.

May 19, 2026
AI Agent Tool Credential Harvesting - AI Security Technique

AI Agent Tool Credential Harvesting is AI attack method AML.T0098 with evidence level: demonstrated. It includes 1 mitigation; 2 case studies.

May 19, 2026
Physical Environment Access - AI Security Technique

Physical Environment Access is AI attack method AML.T0041 with evidence level: demonstrated. It includes 1 mitigation; 2 case studies.

May 19, 2026
Search Victim-Owned Websites - AI Security Technique

Search Victim-Owned Websites is AI attack method AML.T0003 with evidence level: demonstrated. It includes 1 mitigation; 2 case studies.

May 19, 2026
Machine Compromise - AI Security Technique

Machine Compromise is AI attack method AML.T0112 with evidence level: demonstrated. It includes 5 related AI risks.

May 19, 2026
Exploitation for Defense Evasion - AI Security Technique

Exploitation for Defense Evasion is AI attack method AML.T0107 with evidence level: demonstrated. It includes 1 case study; 3 related AI risks.

May 19, 2026
Denial of AI Service - AI Security Technique

Denial of AI Service is AI attack method AML.T0029 with evidence level: demonstrated. It includes 3 mitigations; 2 case studies.

May 19, 2026
Extract AI Model - AI Security Technique

Extract AI Model is AI attack method AML.T0024.002 with evidence level: realized. It includes 3 mitigations; 1 case study.

May 19, 2026
Modify AI Model Architecture - AI Security Technique

Modify AI Model Architecture is AI attack method AML.T0018.001 with evidence level: demonstrated. It includes 3 mitigations; 2 case studies.

May 19, 2026
Train Proxy via Replication - AI Security Technique

Train Proxy via Replication is AI attack method AML.T0005.001 with evidence level: demonstrated. It includes 3 mitigations; 2 case studies.

May 19, 2026
Societal Harm - AI Security Technique

Societal Harm is AI attack method AML.T0048.002 with evidence level: realized. It includes 1 case study; 2 related AI risks.

May 19, 2026
Acquire Infrastructure - AI Security Technique

Acquire Infrastructure is AI attack method AML.T0008 with evidence level: realized. It includes 2 case studies.

May 19, 2026
Active Scanning - AI Security Technique

Active Scanning is AI attack method AML.T0006 with evidence level: realized. It includes 2 case studies.

May 19, 2026
Discover AI Model Outputs - AI Security Technique

Discover AI Model Outputs is AI attack method AML.T0063 with evidence level: demonstrated. It includes 4 mitigations; 2 case studies.

May 19, 2026
Search Application Repositories - AI Security Technique

Search Application Repositories is AI attack method AML.T0004 with evidence level: demonstrated. It includes 1 mitigation; 3 case studies.

May 19, 2026
AI Supply Chain Compromise - AI Security Technique

AI Supply Chain Compromise is AI attack method AML.T0010 with evidence level: realized. It includes 3 mitigations; 1 case study; 1 related AI risk.

May 19, 2026
Virtualization/Sandbox Evasion - AI Security Technique

Virtualization/Sandbox Evasion is AI attack method AML.T0097 with evidence level: realized. It includes 1 case study; 3 related AI risks.

May 19, 2026
Tool Definitions - AI Security Technique

Tool Definitions is AI attack method AML.T0084.001 with evidence level: demonstrated. It includes 1 case study; 5 related AI risks.

May 19, 2026
White-Box Optimization - AI Security Technique

White-Box Optimization is AI attack method AML.T0043.000 with evidence level: demonstrated. It includes 6 mitigations; 2 case studies.

May 19, 2026
Gather Victim Identity Information - AI Security Technique

Gather Victim Identity Information is AI attack method AML.T0087 with evidence level: realized. It includes 3 case studies.

May 19, 2026