Skip to content

Hide Navigation Hide TOC

Adversarial ML Attack Implementations (60a9f8e3-50fa-4dfd-8cc6-1598ce48abe3)

Adversaries may search for existing open source implementations of machine learning attacks. The research community often publishes their code for reproducibility and to further future research. Libraries intended for research purposes, such as CleverHans, the Adversarial Robustness Toolbox, and FoolBox, can be weaponized by an adversary. Adversaries may also obtain and use tools that were not originally designed for adversarial ML attacks as part of their attack.

Cluster A Galaxy A Cluster B Galaxy B Level
Adversarial ML Attack Implementations (60a9f8e3-50fa-4dfd-8cc6-1598ce48abe3) MITRE ATLAS Attack Pattern Obtain Capabilities (41dba0ab-b7bf-40b6-ac47-61dbfa16a53d) MITRE ATLAS Attack Pattern 1