Objective: Exfiltrate Data or Manipulate Model Output
Exfiltrate Data or Manipulate Model Output
/ | \
/ | \
/ | \
/ | \
| | | | 1. Compromise Model Training/Inference | 2. Exploit Flux.jl Library Vulnerabilities | 3. Inject Malicious Model/Weights |
| 1.1 | | 1.3 | | | 2.2 | 2.4 | 3.1 | | |Data | |Evasion | | |Deser- |Untrusted |Pre- | | |Pois-| |Attacks | | |ializ- |Input |trained| | |oning| | [CRIT] | | |ation |Handling |Model | | | [CRIT] | | | | [CRIT] | [CRIT] | [CRIT] | |
Attack Tree Path: Data Poisoning -> Model Output Manipulation
1 -> 1.1
Attack Tree Path: Evasion Attack -> Model Output Manipulation
1 -> 1.3
Attack Tree Path: Pre-trained Malicious Model -> Data Exfiltration/Output Manipulation
3 -> 3.1
2 -> 2.4 -> (Further exploitation)
Attack Tree Path: Deserialization Vulnerability -> Code Injection/Data Exfiltration/Output Manipulation
2 -> 2.2 -> (Further exploitation)