Record summary
A quick snapshot of what this page covers.
Techniques1Attack methods connected to this risk.
Mitigations6Defenses that may help with related attacks.
Domain4. Malicious Actors & MisuseThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain4. Malicious Actors & Misuse
Subdomain4.2 > Cyberattacks, weapon development or use, and mass harm
Entity2 - AI
Intent1 - Intentional
Timing3 - Other
CategoryExtreme Risks
SubcategoryOffensive cyber capabilities
Suggested mitigations
Defenses that may help with related attacks.
Model Hardening
Data PreparationML Model Engineering
Use Ensemble Methods
ML Model Engineering
Use Multi-Modal Sensors
Business and Data UnderstandingData Preparation+1 more
Input Restoration
Data PreparationML Model Evaluation+2 more
Adversarial Input Detection
Data PreparationML Model Engineering+3 more
Deepfake Detection
DeploymentMonitoring and Maintenance+2 more
Source
Research source for this risk, when available.
Included resource
Cataloguing LLM Evaluations
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
