Defense Evasion (15 techniques)
MITRE ATLAS tactic
The adversary is trying to avoid being detected by AI-enabled security software. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include evading AI-enabled security software such as malware detectors.
Techniques
- AML.T0015 — Evade AI Model Maturity: realized
- AML.T0054 — LLM Jailbreak Maturity: demonstrated
- AML.T0067 — LLM Trusted Output Components Manipulation Maturity: demonstrated
- AML.T0068 — LLM Prompt Obfuscation Maturity: demonstrated
- AML.T0071 — False RAG Entry Injection Maturity: demonstrated
- AML.T0073 — Impersonation Maturity: realized
- AML.T0074 — Masquerading Maturity: realized
- AML.T0076 — Corrupt AI Model Maturity: realized
- AML.T0081 — Modify AI Agent Configuration Maturity: demonstrated
- AML.T0092 — Manipulate User LLM Chat History Maturity: demonstrated
- AML.T0094 — Delay Execution of LLM Instructions Maturity: demonstrated
- AML.T0097 — Virtualization/Sandbox Evasion Maturity: realized
- AML.T0107 — Exploitation for Defense Evasion Maturity: demonstrated
- AML.T0109 — AI Supply Chain Rug Pull Maturity: realized
- AML.T0111 — AI Supply Chain Reputation Inflation Maturity: demonstrated
AI red teaming training, taught by practitioners.
Hands-on courses on adversarial AI, prompt injection, and AI security operations.
View AI Security Courses