This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Shubhashree Pattanayak,
Suman Sahoo,
Sanjay Kumar Sahoo,
- Assistant professor, Department of Computer Science and Engineering, Gandhi Institute of Excellent Technocrats, Bhubaneswar, Odisha, India
- Student, Department of Computer Science and Engineering, Gandhi Institute of Excellent Technocrats, Bhubaneswar, Odisha, India
- Student, Department of Computer Science and Engineering, Gandhi Institute of Excellent Technocrats, Bhubaneswar, Odisha, India
Abstract
Artificial Intelligence (AI) is seamlessly weaved into vital sectors such as self-driving cars, high-speed trading systems, and defense strategies, it has triggered a counterintuitive development in advanced cyber-attacks. This survey paper attempts to perform an in-depth technical analysis on “AI Attack Surface.” There are threats across three main vectors. Data Integrity Attacks focuses specifically examining ‘Clean Label’ poisoning and backdoor injection. Model Confidentiality Breaches is discussing the mathematics behind Model Inversion and Membership Inference Attacks. Generative Exploitation is examining Prompt Injection and Hallucinations in Large Models. This paper presents a comprehensive technical survey of the dual nature of AI: its potential to both bolster security and be exploited as an attack vector. We first catalog and analyze the principal threat models associated with AI systems, including adversarial examples, model inversion, data poisoning, and inference attacks. We then explore privacy vulnerabilities stemming from training data leakage, unauthorized model access, and collaborative learning paradigms like federated learning. Through this lens, the survey examines how traditional threats evolve in AI contexts and highlights new attack vectors unique to learning-based systems. Next, we systematically review state-of-the-art countermeasures across defensive categories—robust training, certified defenses, differential privacy, cryptographic approaches, and secure multi-party computation—emphasizing both strengths and limitations. Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), to name a few. In addition to that, we investigate the combined realms of AI and Internet of Things (IoT) through the ZIRCON framework. Instead, we promote a need for a “Zero Watermarking” approach. In closing, we have a strategic outlook for 2025–2075. In fact, we believe that “Explainability” or XAI is not just a norm for regulation. Rather, it is a key to unlocking a future full of Artificial General Intelligence.
Keywords: Adversarial Machine Learning, Differential Privacy, Large Language Models, Prompt Injection, Internet of Things (IoT) Security, Explainable AI (XAI), ZIRCON, Data Poisoning
Shubhashree Pattanayak, Suman Sahoo, Sanjay Kumar Sahoo. Navigating the Dual Edge: A Comprehensive Technical Survey of Security, Privacy, and Countermeasures in the Era of Artificial Intelligence. Journal of Operating Systems Development & Trends. 2026; 13(01):-.
Shubhashree Pattanayak, Suman Sahoo, Sanjay Kumar Sahoo. Navigating the Dual Edge: A Comprehensive Technical Survey of Security, Privacy, and Countermeasures in the Era of Artificial Intelligence. Journal of Operating Systems Development & Trends. 2026; 13(01):-. Available from: https://journals.stmjournals.com/joosdt/article=2026/view=242316
References
- Mohanty SS, Tripathy S. Application of different filtering techniques in digital image processing. InJournal of Physics: Conference Series 2021 Nov (Vol. 2062, No. 1, p. 012007). IOP Publishing.
- Patil P, Chaudhary N, Prasad S, Bhandwal M, Arora M, Singh G. Predicting Student Performance with Machine Learning Algorithms. In2023 3rd International Conference on Technological Advancements in Computational Sciences (ICTACS) 2023 Nov 1 (pp. 1346-1353). IEEE.
- Xue B, Zhang M, Browne WN. Particle swarm optimization for feature selection in classification: A multi-objective approach. IEEE transactions on cybernetics. 2012 Dec 13;43(6):1656-71.
- Shoib S, Siddiqui MF, Turan S, Chandradasa M, Armiya’u AY, Saeed F, De Berardis D, Islam SM, Zaidi I. Artificial intelligence, machine learning approach and suicide prevention: a qualitative narrative review. Preventive Medicine: Research & Reviews. 2025 Nov 1;2(6):289-97.
- Paracha A, Arshad J, Farah MB, Ismail K. Machine learning security and privacy: a review of threats and countermeasures. EURASIP Journal on Information Security. 2024 Apr 23;2024(1):10.
- Wang T, Zhang Y, Qi S, Zhao R, Xia Z, Weng J. Security and privacy on generative data in aigc: A survey. ACM Computing Surveys. 2024 Dec 10;57(4):1-34.
- Zhang Y, Zeng D, Luo J, Xu Z, King I. A survey of trustworthy federated learning with perspectives on security, robustness and privacy. InCompanion proceedings of the ACM web conference 2023 2023 Apr 30 (pp. 1167-1176).
- Rupanetti D, Kaabouch N. Combining edge computing-assisted internet of things security with artificial intelligence: Applications, challenges, and opportunities. Applied Sciences. 2024 Aug 13;14(16):7104.
- Wang H, Lv T, Cao Y, Li W, Zeng J, Huang P, Khan MK. Navigating the dual-use nature and security implications of reconfigurable intelligent surfaces in next-generation wireless systems. IEEE Communications Surveys & Tutorials. 2025 Oct 15.
- Prajapati T. Securing the AI ecosystem: A deep dive into mobile Threats, Countermeasures, and Privacy-Preserving techniques. Artificial Intelligence and Mobile Computing. 2024;1(01 (December)).
- Rupanetti D, Kaabouch N. Combining edge computing-assisted internet of things security with artificial intelligence: Applications, challenges, and opportunities. Applied Sciences. 2024 Aug 13;14(16):7104.
- Aouedi O, Vu TH, Sacco A, Nguyen DC, Piamrat K, Marchetto G, Pham QV. A survey on intelligent Internet of Things: Applications, security, privacy, and future directions. IEEE communications surveys & tutorials. 2024 Jul 18;27(2):1238-92.

Journal of Operating Systems Development & Trends
| Volume | 13 |
| 01 | |
| Received | 27/01/2026 |
| Accepted | 31/01/2026 |
| Published | 20/03/2026 |
| Publication Time | 52 Days |
Login
PlumX Metrics