Skip to content

Hide Navigation Hide TOC

Black-Box Transfer (241ad2a0-3fe2-4912-bb77-b79cee573fd2)

In Black-Box Transfer attacks, the adversary uses one or more proxy models (trained via Create Proxy ML Model or Train Proxy via Replication) they have full access to and are representative of the target model. The adversary uses White-Box Optimization on the proxy models to generate adversarial examples. If the set of proxy models are close enough to the target model, the adversarial example should generalize from one to another. This means that an attack that works for the proxy models will likely then work for the target model. If the adversary has ML Model Inference API Access, they may use Verify Attack to confirm the attack is working and incorporate that information into their training process.

Cluster A Galaxy A Cluster B Galaxy B Level
Craft Adversarial Data (a7c30122-b393-4265-91b7-57cd1211e3f9) MITRE ATLAS Attack Pattern Black-Box Transfer (241ad2a0-3fe2-4912-bb77-b79cee573fd2) MITRE ATLAS Attack Pattern 1