mirror of
https://github.com/mitre/advmlthreatmatrix.git
synced 2025-10-11 04:48:37 -04:00
added cylance graphic
This commit is contained in:
parent
630c1cdbd6
commit
08e46a4f64
2 changed files with 1 additions and 15 deletions
BIN
images/cylance.png
Normal file
BIN
images/cylance.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 81 KiB |
|
@ -222,21 +222,7 @@ Machine translation services (such as Google Translate, Bing Translator, and Sys
|
|||
- The researchers reverse-engineered the ML model to understand which attributes provided what level of positive or negative reputation. Along the way, they discovered a secondary model which was an override for the first model. Positive assessments from the second model overrode the decision of the core ML model.
|
||||
- Using this knowledge, the researchers fused attributes of known good files with malware. Due to the secondary model overriding the primary, the researchers were effectively able to bypass the ML model.
|
||||
|
||||
### Convert to graphic
|
||||
|
||||
Reconnaissance
|
||||
Gathering datasets
|
||||
- Gather verbose logging
|
||||
|
||||
Acquire OSINT information:
|
||||
- Public documentation
|
||||
|
||||
Model Evasion
|
||||
Evasion
|
||||
- Offline evasion
|
||||
|
||||
Evasion
|
||||
- Online evasion
|
||||
<img src="/images/cylance.png" alt="Cylance" height="150"/>
|
||||
|
||||
**Reported by:**
|
||||
Ken Luu (@devianz\_)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue