Skip to content

Hide Navigation Hide TOC

ML Software (d8292a1c-21e7-4b45-b110-0e05feb30a9a)

Most machine learning systems rely on a limited set of machine learning frameworks. An adversary could get access to a large number of machine learning systems through a comprise of one of their supply chains. Many machine learning projects also rely on other open source implementations of various algorithms. These can also be compromised in a targeted way to get access to specific systems.

Cluster A Galaxy A Cluster B Galaxy B Level
ML Software (d8292a1c-21e7-4b45-b110-0e05feb30a9a) MITRE ATLAS Attack Pattern ML Supply Chain Compromise (d2cf31e0-a550-4fe0-8fdb-8941b3ac00d9) MITRE ATLAS Attack Pattern 1