Record summary
A quick snapshot of what this page covers.
Techniques16Attack methods connected to this risk.
Mitigations13Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.2 > AI system security vulnerabilities and attacks
Entity1 - Human
Intent1 - Intentional
Timing2 - Post-deployment
CategoryModel Attacks
SubcategoryExtraction Attacks
Suggested mitigations
Defenses that may help with related attacks.
Control Access to AI Models and Data at Rest
Business and Data UnderstandingData Preparation+2 more
AI Model Distribution Methods
Deployment
Memory Hardening
ML Model EngineeringDeployment+1 more
Passive AI Output Obfuscation
DeploymentML Model Evaluation
Restrict Number of AI Model Queries
Business and Data UnderstandingDeployment+1 more
AI Telemetry Logging
DeploymentMonitoring and Maintenance
Sanitize Training Data
Business and Data UnderstandingData Preparation+1 more
Verify AI Artifacts
Business and Data UnderstandingData Preparation+1 more
Maintain AI Dataset Provenance
Data PreparationBusiness and Data Understanding
Encrypt Sensitive Information
Data PreparationML Model Engineering+1 more
Code Signing
Deployment
AI Bill of Materials
Business and Data UnderstandingData Preparation+1 more
Control Access to AI Models and Data in Production
DeploymentMonitoring and Maintenance
Source
Research source for this risk, when available.
Included resource
Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
