category
AI Security Techniques
Ways AI systems can be attacked or misused, with examples and defenses.
Showing 61-80 of 170 records
LLM Data Leakage is AI attack method AML.T0057 with evidence level: demonstrated. It includes 4 mitigations; 1 case study.
AI Agent Tool Credential Harvesting is AI attack method AML.T0098 with evidence level: demonstrated. It includes 1 mitigation; 2 case studies.
Physical Environment Access is AI attack method AML.T0041 with evidence level: demonstrated. It includes 1 mitigation; 2 case studies.
Search Victim-Owned Websites is AI attack method AML.T0003 with evidence level: demonstrated. It includes 1 mitigation; 2 case studies.
Machine Compromise is AI attack method AML.T0112 with evidence level: demonstrated. It includes 5 related AI risks.
Exploitation for Defense Evasion is AI attack method AML.T0107 with evidence level: demonstrated. It includes 1 case study; 3 related AI risks.
Denial of AI Service is AI attack method AML.T0029 with evidence level: demonstrated. It includes 3 mitigations; 2 case studies.
Extract AI Model is AI attack method AML.T0024.002 with evidence level: realized. It includes 3 mitigations; 1 case study.
Modify AI Model Architecture is AI attack method AML.T0018.001 with evidence level: demonstrated. It includes 3 mitigations; 2 case studies.
Train Proxy via Replication is AI attack method AML.T0005.001 with evidence level: demonstrated. It includes 3 mitigations; 2 case studies.
Societal Harm is AI attack method AML.T0048.002 with evidence level: realized. It includes 1 case study; 2 related AI risks.
Acquire Infrastructure is AI attack method AML.T0008 with evidence level: realized. It includes 2 case studies.
Active Scanning is AI attack method AML.T0006 with evidence level: realized. It includes 2 case studies.
Discover AI Model Outputs is AI attack method AML.T0063 with evidence level: demonstrated. It includes 4 mitigations; 2 case studies.
Search Application Repositories is AI attack method AML.T0004 with evidence level: demonstrated. It includes 1 mitigation; 3 case studies.
AI Supply Chain Compromise is AI attack method AML.T0010 with evidence level: realized. It includes 3 mitigations; 1 case study; 1 related AI risk.
Virtualization/Sandbox Evasion is AI attack method AML.T0097 with evidence level: realized. It includes 1 case study; 3 related AI risks.
Tool Definitions is AI attack method AML.T0084.001 with evidence level: demonstrated. It includes 1 case study; 5 related AI risks.
White-Box Optimization is AI attack method AML.T0043.000 with evidence level: demonstrated. It includes 6 mitigations; 2 case studies.
Gather Victim Identity Information is AI attack method AML.T0087 with evidence level: realized. It includes 3 case studies.