Search for Victim's Publicly Available Code Repositories

Type: technique

Description: Much like the Search for Victim's Publicly Available Research Materials, there is often ample research available on the vulnerabilities of common models. Once a target has been identified, an adversary will likely try to identify any pre-existing work that has been done for this class of models. This will include not only reading academic papers that may identify the particulars of a successful attack, but also identifying pre-existing implementations of those attacks. The adversary may obtain Adversarial ML Attack Implementations or develop their own Adversarial ML Attacks if necessary.

Version: 0.1.0

Created At: 2025-03-04 10:27:40 -0500

Last Modified At: 2025-03-04 10:27:40 -0500


External References

  • --> Reconnaissance (tactic): Gathering publicly available code repositories allows adversaries to understand how and where machine learning is utilized within a target organization, aiding in planning tailored attacks.