Resource Development

The adversary is trying to establish resources they can use to support operations.

5 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the resource development phase of AI attacks.

1
AML.T0002

Acquire Infrastructure

Adversaries may acquire infrastructure to support AI attack operations.

Examples:

  • Setting up cloud infrastructure for AI attacks
  • Acquiring computing resources for model training
  • Establishing command and control infrastructure

Mitigations:

  • Monitor for suspicious infrastructure acquisition
  • Implement infrastructure security controls
  • Regular security assessments
2
AML.T0016

Acquire Capabilities

Adversaries may acquire capabilities to support AI attack operations.

Examples:

  • Purchasing AI attack tools
  • Acquiring pre-trained adversarial models
  • Obtaining AI exploitation frameworks

Mitigations:

  • Monitor for suspicious capability acquisition
  • Implement capability controls
  • Regular security assessments
3
AML.T0017

Develop Capabilities

Adversaries may develop capabilities to support AI attack operations.

Examples:

  • Developing custom AI attack tools
  • Creating adversarial examples
  • Building model extraction capabilities

Mitigations:

  • Monitor for suspicious capability development
  • Implement development controls
  • Regular security assessments
4
AML.T0008

Stage Capabilities

Adversaries may stage capabilities to support AI attack operations.

Examples:

  • Staging AI attack tools
  • Preparing adversarial examples
  • Setting up attack infrastructure

Mitigations:

  • Monitor for suspicious capability staging
  • Implement staging controls
  • Regular security assessments
5
AML.T0019

Obtain Capabilities

Adversaries may obtain capabilities to support AI attack operations.

Examples:

  • Obtaining AI attack tools
  • Acquiring adversarial examples
  • Getting model extraction tools

Mitigations:

  • Monitor for suspicious capability acquisition
  • Implement capability controls
  • Regular security assessments