MLSEC 10 Flashcards

1
Q

ML Pipeline

A

Data Collection and Labeling

System Design and Learning

Performance Evaluation

Deployment and Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pitfall in Data Collection and Labeling

A

Sampling Bias

Label Inaccuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pitfall in System Design and Learning

A

Biased parameters

Spurious correlations

Data snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pitfall in Performance
Evaluation

A

Inappropriate baselines

Inappropriate measures

Base-rate fallacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pitfall in Deployment and Operation

A

Lab-only evaluation

Inappropriate threat model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sampling Bias

A

The collected data does not sufficiently represent the true data distribution of the underlying security problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Label Inaccuracy

A

The ground-truth labels are inaccurate, unstable, or errorenous, affecting the estimated performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Snooping

A

The learning-based system is trained with data or knowledge typically not available in practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spurious Correlations

A

Artefacts unrelated to the security problem create shortcut patterns for separating the classes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biased Parameter Selection

A

Parameters of the learning-based systems are not entirely fixed at training time and indirectly depend on the test data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Inappropriate Baseline

A

The evaluation is conducted with limited baseline methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inappropriate Performance Measures

A

The performance measures do not account for the constraints of the security problem, such as class imbalance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Base Rate Fallacy

A

Class imbalance is ignored when interpreting the performance measures, leading to overestimations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lab-Only Evaluation

A

The learning-based system is solely evaluated in a laboratory setting. Practical constraints are not considered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Inappropriate Threat Model

A

Security of machine learning is not considered, exposing the learning-based system to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly