ML Software (d8292a1c-21e7-4b45-b110-0e05feb30a9a)
Most machine learning systems rely on a limited set of machine learning frameworks. An adversary could get access to a large number of machine learning systems through a comprise of one of their supply chains. Many machine learning projects also rely on other open source implementations of various algorithms. These can also be compromised in a targeted way to get access to specific systems.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
ML Software (d8292a1c-21e7-4b45-b110-0e05feb30a9a) | MITRE ATLAS Attack Pattern | ML Supply Chain Compromise (d2cf31e0-a550-4fe0-8fdb-8941b3ac00d9) | MITRE ATLAS Attack Pattern | 1 |