Defense Evasion

    Cards (3)

    • Evade ML Model
      • Adversaries can Craft Adversarial Data that prevent a machine learning model from correctly identifying the contents of the data. This technique can be used to evade a downstream task where machine learning is utilized. The adversary may evade machine learning based virus/malware detection, or network scanning towards the goal of a traditional cyber attack.
    • LLM Prompt Injections and Jailbreaks are also techniques to evade defenses
    • Defense Evasion
      • The adversary is trying to avoid being detected by machine learning-enabled security software.
      • Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include evading ML-enabled security software such as malware detectors.
    See similar decks