# information-leakage
5 articlestagged with “information-leakage”
Activation Analysis & Hidden State Exploitation
Reading model internals via hidden state extraction, logprob probing, refusal direction analysis, and activation steering techniques.
Lab: GPU Side-Channel Attacks
Demonstrate information leakage through GPU memory residuals and timing side channels, showing how shared GPU infrastructure can expose sensitive model data.
Model Caching Security
Security risks of caching in AI inference — covering KV cache attacks, prompt caching exploitation, shared cache information leakage, cache poisoning, and secure caching configurations.
Cross-Modal Information Leakage
Techniques for extracting sensitive information through modality boundary violations, including system prompt leakage via image descriptions, context window dumping through multi-modal queries, and side-channel attacks across modalities.
Timing Side-Channel Attack Walkthrough
Extract information from LLM applications through timing differences in response generation and safety filter processing.