Information Leakage Analysis

Evaluating Large Language Models in detecting Secrets in Android Apps

Authors: Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-10-21
Program Analysis
Prompt Injection
Information Leakage Analysis

The Trust Paradox in LLM-Based Multi-Agent Systems: When Collaboration Becomes a Security Vulnerability

Authors: Zijie Xu, Minfeng Qi, Shiqing Wu, Lefeng Zhang, Qiwen Wei, Han He, Ningran Li | Published: 2025-10-21
Privacy Violation
Reliability Scoring
Information Leakage Analysis

The Attribution Story of WhisperGate: An Academic Perspective

Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21
RAG
Network Threat Detection
Information Leakage Analysis

CyberSOCEval: Benchmarking LLMs Capabilities for Malware Analysis and Threat Intelligence Reasoning

Authors: Lauren Deason, Adam Bali, Ciprian Bejean, Diana Bolocan, James Crnkovich, Ioana Croitoru, Krishna Durai, Chase Midler, Calin Miron, David Molnar, Brad Moon, Bruno Ostarcevic, Alberto Peltea, Matt Rosenberg, Catalin Sandu, Arthur Saputkin, Sagar Shah, Daniel Stan, Ernest Szocs, Shengye Wan, Spencer Whitman, Sven Krasser, Joshua Saxe | Published: 2025-09-24
Security Metric
Dataset for Malware Classification
Information Leakage Analysis

“I wasn’t sure if this is indeed a security risk”: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages

Authors: Rajdeep Ghosh, Shiladitya De, Mainack Mondal | Published: 2025-06-09
API Security
Cyber Threat
Information Leakage Analysis

Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection

Authors: Mir Hassan, Chen Jincai, Adnan Iftekhar, Adnan Shehzad, Xiaohui Cui | Published: 2020-12-28
Data Management System
Information Leakage Analysis
Defense Mechanism

PicoDomain: A Compact High-Fidelity Cybersecurity Dataset

Authors: Craig Laprade, Benjamin Bowman, H. Howie Huang | Published: 2020-08-20
Data Generation
Information Leakage Analysis
Anomaly Detection Method

NoPeek: Information leakage reduction to share activations in distributed deep learning

Authors: Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, Ramesh Raskar | Published: 2020-08-20
Information Leakage Analysis
Adversarial Example
Deep Learning

Characterizing Membership Privacy in Stochastic Gradient Langevin Dynamics

Authors: Bingzhe Wu, Chaochao Chen, Shiwan Zhao, Cen Chen, Yuan Yao, Guangyu Sun, Li Wang, Xiaolu Zhang, Jun Zhou | Published: 2019-10-05
Privacy Protection Mechanism
Privacy Classification
Information Leakage Analysis

F-BLEAU: Fast Black-box Leakage Estimation

Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi | Published: 2019-02-04 | Updated: 2020-10-27
Generalization Performance
Convergence Guarantee
Information Leakage Analysis