mirror of
https://github.com/mitre/advmlthreatmatrix.git
synced 2025-07-22 06:49:53 -04:00
c3803ff
This commit is contained in:
commit
d7e661c241
424 changed files with 1723 additions and 0 deletions
16
content/update-files/2021-06.md
Normal file
16
content/update-files/2021-06.md
Normal file
|
@ -0,0 +1,16 @@
|
|||
# June 2021
|
||||
<br />
|
||||
|
||||
## Website
|
||||
v2.0.0 - 2.1.3
|
||||
<br>
|
||||
|
||||
Official launch of https://atlas.mitre.org, allowing users to browse the ATLAS matrix and initial set of case studies.
|
||||
|
||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/3FN9v-y-C-w" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||
|
||||
## Data
|
||||
v2.0.0
|
||||
<br>
|
||||
|
||||
This version of ATLAS data contains 16 tactics, 30 techniques, 17 sub-techniques, and 13 case studies. 14 of the tactics and several techniques used in case studies were imported from MITRE ATT&CK® Enterprise v9.
|
14
content/update-files/2021-07.md
Normal file
14
content/update-files/2021-07.md
Normal file
|
@ -0,0 +1,14 @@
|
|||
# July 2022
|
||||
<br>
|
||||
|
||||
## Website
|
||||
v2.2.0 - 2.2.2
|
||||
<br>
|
||||
|
||||
ATLAS Navigator layers are available for case studies, highlighting techniques used in each procedure. See the "ATLAS Navigator layer" button on the case study pages for to view and download the layer files.
|
||||
|
||||
## Data
|
||||
v2.0.1
|
||||
<br>
|
||||
|
||||
This version of ATLAS data contains 16 tactics, 30 techniques, 17 sub-techniques, and 13 case studies. 14 of the tactics and several techniques used in case studies were imported from MITRE ATT&CK® Enterprise v9.
|
18
content/update-files/2021-10.md
Normal file
18
content/update-files/2021-10.md
Normal file
|
@ -0,0 +1,18 @@
|
|||
# October 2021
|
||||
<br>
|
||||
|
||||
## Website
|
||||
v2.3.0 - 2.3.2
|
||||
<br>
|
||||
|
||||
Technique pages display examples of how techniques have been used in case studies, drawn from procedure steps.
|
||||
|
||||
## Data
|
||||
v2.2.0
|
||||
<br>
|
||||
|
||||
This version of ATLAS data contains 16 tactics, 30 techniques, 17 sub-techniques, and 15 case studies. 14 of the tactics and several techniques used in case studies were imported from MITRE ATT&CK® Enterprise v9.
|
||||
|
||||
New case studies:
|
||||
- [Backdoor Attack on Deep Learning Models in Mobile Apps](https://atlas.mitre.org/studies/AML.CS0013)
|
||||
- [Confusing Antimalware Neural Networks](https://atlas.mitre.org/studies/AML.CS0014)
|
38
content/update-files/2022-03.md
Normal file
38
content/update-files/2022-03.md
Normal file
|
@ -0,0 +1,38 @@
|
|||
# March 2022
|
||||
<br>
|
||||
|
||||
## Website
|
||||
v3.0.0
|
||||
<br>
|
||||
|
||||
This website update adds new functionality in the form of the Case Study Builder. The builder can be used to craft submission files for new case studies with details and technique mappings.
|
||||
|
||||
The [Case Study Builder](https://atlas.mitre.org/studies/create) can be found in the “Build Case Study” subsection located under the “Case Study” tab in the navigation menu.
|
||||
|
||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/Np_ip14YJGg" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||
|
||||
### How to Use the Case Study Builder:
|
||||
<p></p>
|
||||
|
||||
1. Fill out the form.
|
||||
2. Download the generated case study .yaml file (and PowerPoint .pptx version if selected).
|
||||
3. Email the case study file to atlas@mitre.org
|
||||
\
|
||||
To view or edit an existing case study, click the "Load Case Study" button and upload the .yaml file. Make any necessary adjustments, then re-download the file. The ATLAS team will review the submission and follow up with feedback.
|
||||
|
||||
### Case Study Considerations:
|
||||
<p></p>
|
||||
|
||||
1. The attack exploits one or more vulnerabilities that compromise the confidentiality, integrity, or availability of a ML system.
|
||||
2. The attack is against a production/commercial ML system. This can be on MLaaS or ML systems embedded in clients/at the edge.
|
||||
3. Ensure you have permission to share this information and/or publish this research. Please follow the proper channels before reporting a new attack and make sure you are practicing responsible disclosure.
|
||||
\
|
||||
We are especially excited for new case-studies! We look forward to contributions from both industry and academic researchers.
|
||||
|
||||
## Data
|
||||
v3.0.0
|
||||
<br>
|
||||
|
||||
This version of ATLAS data contains 12 tactics, 33 techniques, 17 sub-techniques, and 15 case studies.
|
||||
|
||||
Prior usage of MITRE ATT&CK® Enterprise tactics and techniques have been adapted into the ATLAS framework, with ATLAS IDs and updated machine learning-specific descriptions.
|
Loading…
Add table
Add a link
Reference in a new issue