← Back to ATLAS MatrixTactic 2 of 15
Resource Development
The adversary is trying to establish resources they can use to support operations.
5 Techniques
MITRE ATLAS Framework
Attack Techniques
Explore the specific techniques adversaries use during the resource development phase of AI attacks.
1
AML.T0002
Acquire Infrastructure
Adversaries may acquire infrastructure to support AI attack operations.
Examples:
- •Setting up cloud infrastructure for AI attacks
- •Acquiring computing resources for model training
- •Establishing command and control infrastructure
Mitigations:
- ✓Monitor for suspicious infrastructure acquisition
- ✓Implement infrastructure security controls
- ✓Regular security assessments
References:
2
AML.T0016
Acquire Capabilities
Adversaries may acquire capabilities to support AI attack operations.
Examples:
- •Purchasing AI attack tools
- •Acquiring pre-trained adversarial models
- •Obtaining AI exploitation frameworks
Mitigations:
- ✓Monitor for suspicious capability acquisition
- ✓Implement capability controls
- ✓Regular security assessments
References:
3
AML.T0017
Develop Capabilities
Adversaries may develop capabilities to support AI attack operations.
Examples:
- •Developing custom AI attack tools
- •Creating adversarial examples
- •Building model extraction capabilities
Mitigations:
- ✓Monitor for suspicious capability development
- ✓Implement development controls
- ✓Regular security assessments
References:
4
AML.T0008
Stage Capabilities
Adversaries may stage capabilities to support AI attack operations.
Examples:
- •Staging AI attack tools
- •Preparing adversarial examples
- •Setting up attack infrastructure
Mitigations:
- ✓Monitor for suspicious capability staging
- ✓Implement staging controls
- ✓Regular security assessments
References:
5
AML.T0019
Obtain Capabilities
Adversaries may obtain capabilities to support AI attack operations.
Examples:
- •Obtaining AI attack tools
- •Acquiring adversarial examples
- •Getting model extraction tools
Mitigations:
- ✓Monitor for suspicious capability acquisition
- ✓Implement capability controls
- ✓Regular security assessments