Request on the ontology

This form allows you to query the ontology.
By default, an AND relationship is assumed between each field in the form. Thus, if you are not sure of the field value or if a field can take several values, leave the default value.
Please note that at least one of the fields must take a non-default value for the query to work.

All fields marked with an * (asterisk) are required.

What would you like to know?


What do you already know about...

... the System Under Test?

The way in which a system feature is accessed.
Black-box access: when only the outputs of the model are accessible.
White-box access: when information about the model, algorithm and dataset used is available.

... the Attacker Profile?

The Attacker Profile describes the motivations and means of the attacker. It includes: its knowledge of the system, its goal, its capability, and its attack strategy. From this profile, the limits of the attacks on the system can also be determined.
This corresponds to the amount of information available to the opponent.
Complete knowledge means that the adversary has a white-box access to the system. If not, he has a limited knowledge or no knowledge at all.
Attack vectors available to the attacker. For example, during the training phase, the attacker may have the ability to influence the training. At the testing/inference phase, the attacker can change the model's behavior or steal internal model information.
Level of destruction the attacker wishes to achieve, i.e. the type of security violation.
It refers to the method by which the adversaries optimize their attacks.
It refers to the method by which the adversaries optimize their attacks.
It refers to the method by which the adversaries optimize their attacks.

... the Testing Framework?