Skip to content

Hide Navigation Hide TOC

Technical Blogs (0aac198b-3d5e-40ff-9460-290035d67717)

Research labs at academic institutions and Company R&D divisions often have blogs that highlight their use of machine learning and its application to the organizations unique problems. Individual researchers also frequently document their work in blogposts. An adversary may search for posts made by the target victim organization or its employees. In comparison to Journals and Conference Proceedings and Pre-Print Repositories this material will often contain more practical aspects of the machine learning system. This could include underlying technologies and frameworks used, and possibly some information about the API access and use case. This will help the adversary better understand how that organization is using machine learning internally and the details of their approach that could aid in tailoring an attack.

Cluster A Galaxy A Cluster B Galaxy B Level
Search for Victim's Publicly Available Research Materials (229ead06-da1e-443c-8ff1-e57a3ae0eb61) MITRE ATLAS Attack Pattern Technical Blogs (0aac198b-3d5e-40ff-9460-290035d67717) MITRE ATLAS Attack Pattern 1