Common Information
Type | Value |
---|---|
Value |
Data |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | Data is a key vector of supply chain compromise for adversaries. Every machine learning project will require some form of data. Many rely on large open source datasets that are publicly available. An adversary could rely on compromising these sources of data. The malicious data could be a result of [Poison Training Data](/techniques/AML.T0020) or include traditional malware. An adversary can also target private datasets in the labeling phase. The creation of private datasets will often require the hiring of outside labeling services. An adversary can poison a dataset by modifying the labels being generated by the labeling service. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2009-05-22 | 8 | Gumblar and More On Javascript Obfuscation | ||
Details | Website | 2009-05-22 | 15 | Fixing Exchange 2007 Offline Address Book generation (oalgen) and distribution issues | Corelan Cybersecurity Research | ||
Details | Website | 2009-05-21 | 0 | Thunder Tables™ Explained | ||
Details | Website | 2009-05-17 | 0 | The Debian PGP disaster that almost was | ||
Details | Website | 2009-05-17 | 6 | Backdoor:Win32/Lamin.A threat description - Microsoft Security Intelligence | ||
Details | Website | 2009-05-13 | 0 | Not all shellcode locations are made equal | ||
Details | Website | 2009-05-13 | 6 | IP Blacklisting in Snort | ||
Details | Website | 2009-05-13 | 6 | FET Firmware from MSP430.DLL | ||
Details | Website | 2009-05-10 | 0 | Excellent Sunday Linkage | ||
Details | Website | 2009-05-05 | 0 | Torpig Botnet Hijacking Reveals 70GB Of Stolen Data - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-04-30 | 3 | Improving the MSP430 FET | ||
Details | Website | 2009-04-30 | 0 | Some days you just can't walk away..... | ||
Details | Website | 2009-04-16 | 0 | On Biometrics and Passwords - Not A Number | ||
Details | Website | 2009-04-07 | 0 | Webtunnel 0.0.5 Released - HTTP Encapsulation and Tunnel Tool - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-04-01 | 3 | Tamper Data: CSRF examined | ||
Details | Website | 2009-04-01 | 122 | An Analysis of Conficker C | ||
Details | Website | 2009-03-27 | 9 | BEA WebLogic plug-in for Apache JSESSION Cookie overflow | ||
Details | Website | 2009-03-23 | 4 | Keylogger Recorder Meterpreter Script | ||
Details | Website | 2009-03-20 | 14 | Memory Analysis, for real! | ||
Details | Website | 2009-03-19 | 7 | Creating new detection coverage : Using SCADA OMRON-FINS as an example | ||
Details | Website | 2009-03-18 | 166 | Carders do battle through spam - carder.su | ||
Details | Website | 2009-03-15 | 31 | Breaking 802.15.4 AES128 by Syringe | ||
Details | Website | 2009-03-12 | 1 | Malware for Incident Responders - Examples | ||
Details | Website | 2009-03-10 | 3 | Behold the Glory of Mattland | ||
Details | Website | 2009-03-09 | 8 | Supplemental Data for Calculating Mozilla Patching Speed - Microsoft Security Blog |