Skip to content

Hide Navigation Hide TOC

Model (452b8fdf-8679-4013-bb38-4d16f65430bc)

Machine learning systems often rely on open sourced models in various ways. Most commonly, the victim organization may be using these models for fine tuning. These models will be downloaded from an external source and then used as the base for the model as it is tuned on a smaller, private dataset. Loading models often requires executing some saved code in the form of a saved model file. These can be compromised with traditional malware, or through some adversarial machine learning techniques.

Cluster A Galaxy A Cluster B Galaxy B Level
Model (452b8fdf-8679-4013-bb38-4d16f65430bc) MITRE ATLAS Attack Pattern ML Supply Chain Compromise (d2cf31e0-a550-4fe0-8fdb-8941b3ac00d9) MITRE ATLAS Attack Pattern 1