Skip to content

Hide Navigation Hide TOC

ML Software (4627c4e6-fb06-4bfa-add5-dc46e0043aff)

Most machine learning systems rely on a limited set of machine learning frameworks. An adversary could get access to a large number of machine learning systems through a comprise of one of their supply chains. Many machine learning projects also rely on other open source implementations of various algorithms. These can also be compromised in a targeted way to get access to specific systems.

Cluster A Galaxy A Cluster B Galaxy B Level
ML Software (4627c4e6-fb06-4bfa-add5-dc46e0043aff) MITRE ATLAS Attack Pattern ML Supply Chain Compromise (b6697dbf-3e3f-41ce-a212-361d1c0ca0e9) MITRE ATLAS Attack Pattern 1