Model Extraction
mediumai-model-extraction
Attacker queries AI model systematically to reconstruct or steal proprietary model weights and architecture
Information Disclosure
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1530 | Data from Cloud Storage Object | Collection |
Common Weakness Enumeration
Mitigating controls
ctrl-extract-1- Implement strict rate limiting on model API endpoints
ctrl-extract-2- Monitor for systematic querying patterns
ctrl-extract-3- Add output perturbation to prevent exact replication
ctrl-extract-4- Restrict API access with strong authentication