The UML class diagram visualizes a threat model with 2 threats, determined from the conducted systematic literature review, which target the model's operational data for the initial compromise. The compromise of the model's operational data is conducted either through “Processing hardware running the ML model”.
Model’s operational data: transient and intermediate data and calculations generated and executed upon, during the model’s operational, inference stage like target model’s parameters. The operational data is held in system memory during model’s operations, it may contain temporary results and sensitive information. In case of LLM’s, the calculations for the preprocessed input query involve calculations across model’s layers, attention mechanisms, processing of token embeddings.