Securing Artificial-Intelligence Systems

AIMATIVE Automated cyber threat modeling

The methods underpinning the production machine learning systems are systematically vulnerable to a new class of vulnerabilities across the machine learning supply chain collectively known as Adversarial Machine Learning. Adversaries can exploit these vulnerabilities to manipulate AI systems in order…

Evolution of graphs and attack trees in cybersecurity

AIMATIVE Automated cyber threat modeling

The evolution of graphs and attack trees has played a significant role in the field of cybersecurity. These tools have helped security professionals to visualize and understand the complexity of cyber threats and to develop effective strategies for defending against…

New data transmission standards in cyber intelligence

AIMATIVE Automated cyber threat modeling

STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated Exchange of Indicator Information) are two important standards in the field of cyber threat intelligence. These standards are designed to facilitate the exchange of threat intelligence information between different organizations and…

Measuring the cyber threat

AIMATIVE Automated cyber threat modeling

Measuring the severity of a cyber threat can be a challenging task, as it involves evaluating the potential impact of an attack on an organization or individual. There are several factors that can be used to assess the level of…

Decompiling Mobile Device Technology Stack

AIMATIVE Automated cyber threat modeling

Mobile devices share some architectural similarities with their desktop counterparts, but there are significant distinctions between personal computers and these portable information systems. In addition to cellular functionality, including a number of radios, modern smartphones and tablets typically include a…

MITRE ATT&CK: Beyond the Limits

AIMATIVE Automated cyber threat modeling

The MITRE ATT&CK framework is a widely-used resource for understanding and mitigating cyber threats. It is a comprehensive matrix that categorizes and documents the tactics, techniques, and procedures (TTPs) used by attackers to compromise systems. The matrix is organized by…