Search for Victim's Publicly Available Research Materials
Type: technique
Description: Adversaries may search publicly available research to learn how and where machine learning is used within a victim organization. The adversary can use this information to identify targets for attack, or to tailor an existing attack to make it more effective. Organizations often use open source model architectures trained on additional proprietary data in production. Knowledge of this underlying architecture allows the adversary to craft more realistic proxy models. An adversary can search these resources for publications for authors employed at the victim organization.
Version: 0.1.0
Created At: 2025-03-04 10:27:40 -0500
Last Modified At: 2025-03-04 10:27:40 -0500
External References
Related Objects
- --> Reconnaissance (tactic): Gathering publicly available research materials allows adversaries to understand how and where machine learning is utilized within a target organization, aiding in planning tailored attacks.