# model-security
10 articlestagged with “model-security”
AI Supply Chain Incident Response
Incident response procedures for compromises in the AI supply chain, including model repositories, training pipelines, and dependency chains.
Model Backdoor Detection Forensics
Forensic techniques for detecting, analyzing, and attributing backdoors implanted in machine learning models through training-time or post-training attacks.
Backdoor Detection in Fine-Tuned Models
Detecting backdoors in fine-tuned AI models: activation analysis, trigger scanning techniques, behavioral probing strategies, and statistical methods for identifying hidden malicious functionality.
Capstone: Security Audit of an Open-Source LLM
Conduct a comprehensive security audit of an open-source large language model, covering model weights integrity, safety alignment evaluation, supply chain verification, and adversarial robustness testing.
Security Risks of Cloud AI Model Marketplaces
Assessing security risks in cloud AI model marketplaces including AWS Bedrock Model Garden, Azure AI Model Catalog, GCP Vertex AI Model Garden, and Hugging Face Hub, covering supply chain attacks, trojan models, and verification gaps.
Fine-Tuning Security
Comprehensive overview of how fine-tuning can compromise model safety -- attack taxonomy covering dataset poisoning, safety degradation, backdoor insertion, and reward hacking in the era of widely available fine-tuning APIs.
LoRA & Adapter Attack Surface
Overview of security vulnerabilities in parameter-efficient fine-tuning methods including LoRA, QLoRA, and adapter-based approaches -- how the efficiency and shareability of adapters create novel attack vectors.
Model Deep Dives
Why model-specific knowledge matters for AI red teaming, how different architectures create different attack surfaces, and a systematic methodology for profiling any new model.
Open-Weight Model Security
Security analysis of open-weight models including Llama, Mistral, Qwen, and DeepSeek, covering unique risks from full weight access, fine-tuning attacks, and deployment security challenges.
Security of Training Checkpoints
Threat analysis of model checkpoint storage, serialization, and restoration including checkpoint poisoning, deserialization attacks, and integrity verification.