[IDE.T.1] An Embedding Inversion Attack exploits vulnerabilities to invert embeddings and recover significant amounts of source information, compromising data confidentiality.
System Asset: Supporting IT infrastructure.
Business Asset: input data embeddings.
Security Criteria: confidentiality.
Vulnerabilities:
Threat agent: white-box and black-box scenarios. In the white-box scenario, the attacker is assumed to have complete knowledge of the target machine learning model, its architecture, parameters, utilized training data, and the learning algorithm. In a black-box scenario, the attacker has no knowledge of the target model's architecture, parameters, or training data. The attacker is assumed to be only able to interact with the model by sending it inputs and observing the outputs.
Attack methods:
Impact and harm: Negates the confidentiality of previously provided input to the machine learning system, by extension model's confidentiality is compromised in addition. This may lead to legal repercussions.
Security requirement: The machine learning system's actions and decisions must be resistant to embedding inversion attacks.
Security controls: