Persistence (9 techniques)

MITRE ATLAS tactic

The adversary is trying to maintain their foothold via AI artifacts or software. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence often involve leaving behind modified ML artifacts such as poisoned training data or manipulated AI models.

Techniques

AI red teaming training, taught by practitioners.

Hands-on courses on adversarial AI, prompt injection, and AI security operations.

View AI Security Courses