AI Model Access

The adversary is trying to gain access to AI models and their capabilities.

4 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the ai model access phase of AI attacks.

1
AML.T0040

Access AI Model

Adversaries may attempt to gain access to AI models.

Examples:

  • Accessing model APIs
  • Gaining model repository access
  • Compromising model hosting services

Mitigations:

  • Model access controls
  • API security
  • Authentication and authorization
2
AML.T0047

Access AI Model

Adversaries may attempt to gain access to AI models.

Examples:

  • Accessing model APIs
  • Gaining model repository access
  • Compromising model hosting services

Mitigations:

  • Model access controls
  • API security
  • Authentication and authorization
3
AML.T0041

Access AI Model

Adversaries may attempt to gain access to AI models.

Examples:

  • Accessing model APIs
  • Gaining model repository access
  • Compromising model hosting services

Mitigations:

  • Model access controls
  • API security
  • Authentication and authorization
4
AML.T0044

Access AI Model

Adversaries may attempt to gain access to AI models.

Examples:

  • Accessing model APIs
  • Gaining model repository access
  • Compromising model hosting services

Mitigations:

  • Model access controls
  • API security
  • Authentication and authorization