# model-fingerprinting
2 articlestagged with “model-fingerprinting”
Side-Channel Model Attacks
Deep dive into inferring model architecture, size, and deployment details through timing analysis, cache-based attacks, power/electromagnetic side channels, embedding endpoint exploitation, and architecture fingerprinting.
side-channeltiming-attackscache-attacksmodel-fingerprintingarchitecture-inferencemodel-extraction
AI API Red Team Engagement
Complete walkthrough for testing AI APIs: endpoint enumeration, authentication bypass, rate limit evasion, input validation testing, output data leakage, and model fingerprinting through API behavior.
apiengagementauthenticationrate-limitinginput-validationmodel-fingerprintingwalkthrough