Adversarial ML Attack Implementations (3250c828-3852-4efb-857d-f7ca5c1a1ebc)
Adversaries may search for existing open source implementations of machine learning attacks. The research community often publishes their code for reproducibility and to further future research. Libraries intended for research purposes, such as CleverHans, the Adversarial Robustness Toolbox, and FoolBox, can be weaponized by an adversary. Adversaries may also obtain and use tools that were not originally designed for adversarial ML attacks as part of their attack.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Obtain Capabilities (ATLAS) (db2b3112-a99b-45a0-be10-c69157b616f0) | MITRE ATLAS Attack Pattern | Adversarial ML Attack Implementations (3250c828-3852-4efb-857d-f7ca5c1a1ebc) | MITRE ATLAS Attack Pattern | 1 |