category

AI Security Techniques

Ways AI systems can be attacked or misused, with examples and defenses.

Showing 101-120 of 170 records

Local AI Agent - AI Security Technique

Local AI Agent is AI attack method AML.T0112.000 with evidence level: demonstrated. It includes 3 case studies; 5 related AI risks.

Modify AI Agent Configuration - AI Security Technique

Modify AI Agent Configuration is AI attack method AML.T0081 with evidence level: demonstrated. It includes 3 case studies; 5 related AI risks.

LLM Response Rendering - AI Security Technique

LLM Response Rendering is AI attack method AML.T0077 with evidence level: demonstrated. It includes 3 case studies; 5 related AI risks.

Manual Modification - AI Security Technique

Manual Modification is AI attack method AML.T0043.003 with evidence level: realized. It includes 5 mitigations; 3 case studies.

Embed Malware - AI Security Technique

Embed Malware is AI attack method AML.T0018.002 with evidence level: realized. It includes 1 mitigation; 2 case studies; 5 related AI risks.

Extract LLM System Prompt - AI Security Technique

Extract LLM System Prompt is AI attack method AML.T0056 with evidence level: feasible. It includes 3 mitigations; 12 related AI risks.

Reputational Harm - AI Security Technique

Reputational Harm is AI attack method AML.T0048.001 with evidence level: demonstrated. It includes 1 case study; 10 related AI risks.

AI Agent Context Poisoning - AI Security Technique

AI Agent Context Poisoning is AI attack method AML.T0080 with evidence level: demonstrated. It includes 1 mitigation; 12 related AI risks.

Datasets - AI Security Technique

Datasets is AI attack method AML.T0002.000 with evidence level: demonstrated. It includes 1 mitigation; 6 case studies.

Data from Local System - AI Security Technique

Data from Local System is AI attack method AML.T0037 with evidence level: realized. It includes 3 case studies; 5 related AI risks.

Model - AI Security Technique

Model is AI attack method AML.T0010.003 with evidence level: realized. It includes 5 mitigations; 4 case studies.

Full AI Model Access - AI Security Technique

Full AI Model Access is AI attack method AML.T0044 with evidence level: demonstrated. It includes 2 mitigations; 3 case studies; 6 related AI risks.

Publish Poisoned Datasets - AI Security Technique

Publish Poisoned Datasets is AI attack method AML.T0019 with evidence level: demonstrated. It includes 3 mitigations; 1 case study; 10 related AI risks.

Delay Execution of LLM Instructions - AI Security Technique

Delay Execution of LLM Instructions is AI attack method AML.T0094 with evidence level: demonstrated. It includes 1 case study; 12 related AI risks.

Call Chains - AI Security Technique

Call Chains is AI attack method AML.T0084.003 with evidence level: demonstrated. It includes 1 case study; 12 related AI risks.

Gather RAG-Indexed Targets - AI Security Technique

Gather RAG-Indexed Targets is AI attack method AML.T0064 with evidence level: demonstrated. It includes 1 case study; 12 related AI risks.

AI Software - AI Security Technique

AI Software is AI attack method AML.T0010.001 with evidence level: realized. It includes 2 mitigations; 5 case studies; 1 related AI risk.

Erode AI Model Integrity - AI Security Technique

Erode AI Model Integrity is AI attack method AML.T0031 with evidence level: realized. It includes 4 mitigations; 5 case studies.

Erode Dataset Integrity - AI Security Technique

Erode Dataset Integrity is AI attack method AML.T0059 with evidence level: demonstrated. It includes 2 mitigations; 1 case study; 12 related AI risks.

AI Artifact Collection - AI Security Technique

AI Artifact Collection is AI attack method AML.T0035 with evidence level: realized. It includes 4 mitigations; 3 case studies; 5 related AI risks.