Extract
Model Extraction
Theft of a proprietary model's functionality through strategic queries to its API, allowing the recreation of an equivalent model without access to the original.
Corinne L. Jones, Robert A. Bridges, Kelly Huffer, John Goodall
Mitigation Strategy
Detection of anomalous query patterns, limitation of rate limits and query budgets, addition of defensive noise in outputs (Output Perturbation), and model watermarking.
Atomic Number
37
Ex
Risk ID
rb-37
Severity
7/10
Severity Level