Model Inversion Attack: Difference between revisions

From Cognitive Attack Taxonomy
Line 27: Line 27:
'''Multipliers:'''  <br>
'''Multipliers:'''  <br>


'''Detailed Description:''' Model Inversion Attacks utilize a model’s outputs as a means to reconstruct original training data sets or samples, potentially revealing sensitive information. A Model Inversion Attack requires awareness of model structure and outputs which the attacker uses to associate inputs and outputs. Through an iterative process, the attacker cumulatively reconstructs original input data. These attacks have the potential to reveal to sensitive training data.  
'''Detailed Description:''' Model Inversion Attacks utilize a model’s outputs as a means to reconstruct original training data sets or samples, potentially revealing sensitive information. A Model Inversion Attack requires awareness of model structure and outputs which the attacker uses to associate inputs and outputs. Through an iterative process, the attacker cumulatively reconstructs original input data. These attacks have the potential to reveal to sensitive training data<ref>https://saturncloud.io/glossary/model-inversion-attacks/</ref>.  
<br>
<br>



Revision as of 02:48, 7 October 2024

Model Inversion Attack

Short Description: Attacker uses model responses to recontruct training dataset.

CAT ID: CAT-2023-014

Layer: 7

Operational Scale: Operational

Level of Maturity: Proof of Concept

Category: Exploit

Subcategory:

Also Known As:

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Model Inversion Attacks utilize a model’s outputs as a means to reconstruct original training data sets or samples, potentially revealing sensitive information. A Model Inversion Attack requires awareness of model structure and outputs which the attacker uses to associate inputs and outputs. Through an iterative process, the attacker cumulatively reconstructs original input data. These attacks have the potential to reveal to sensitive training data[1].

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:

Comments:

References: