Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

3Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As the practicality of Artificial Intelligence (AI) and Machine Learning (ML) based techniques grow, there is an ever increasing threat of adversarial attacks. There is a need to "red team' this ecosystem to identify system vulnerabilities, potential threats, characterize properties that will enhance system robustness, and encourage the creation of effective defenses. A secondary need is to share this AI security threat intelligence between different stakeholders like, model developers, users, and AI/ML security professionals. In this paper, we create and describe a prototype system CTI4AI, to overcome the need to methodically identify and share AI/ML specific vulnerabilities and threat intelligence.

Cite

CITATION STYLE

APA

Nguyen, C., Morgan, C., & Mittal, S. (2022). Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 3431–3433). Association for Computing Machinery. https://doi.org/10.1145/3548606.3563525

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free