Often we come across various adversarial AI attacks. Over the time, there have been numerous attacks surfacing with extensive use of one or more AI model(s) together in any application. In this blog post, a one stop platform summarizing the critical adversarial AI attacks is provided. The comparative assessment of these attacks is performed on certain basic features – Modus Operandi, Type of information affected, Phase of AI operation, and More Realizable Applicable Case Study/ Use Case (Examples are not limited to the ones listed below. The examples below are only for better realization purpose). It is worth noting that, the following content is limited and readers are encouraged to refer other valid sources for detailed information.

Attack TypeModus OperandiType of Information AffectedPhase of AI OperationMore Realizable Applicable Case Study/ Use Case
PoisoningAltering the training data to cause incorrect model behavior.Training DataTrainingML-based Cybersecurity Systems
InferenceManipulating inputs to identify if a particular input was used as training dataset.Training DataPrediction/ ClassificationImage and Speech Recognition
ExtractionExtracting sensitive information from the model.Model parametersTraining/
Prediction
ML-based Cybersecurity Systems
EvasionManipulating inputs to cause the model to misclassify the inputs.OutputsPrediction/ ClassificationImage and Speech Recognition
BackdoorIntroducing a hidden trigger that causes the model to misbehave when activated.OutputsPrediction/ ClassificationML-based Cybersecurity Systems
Adversarial ReprogrammingAltering the model’s parameters or architecture to cause incorrect behavior by injecting malicious information in the inputInput,
Model parameters/ architecture
TrainingNLP models
Decision Trees
TransferabilityManipulating inputs in a way that causes a model trained on one task to fail on a related but different task.OutputsPrediction/ ClassificationML-based Security Systems
InversionInverting the model to recreate sensitive information used as input training data.Training DataPrediction/ ClassificationImage and Speech Recognition
Comparative Assessment of Critical Adversarial AI Attacks

Leave a Reply

Your email address will not be published. Required fields are marked *