The document proposes a content inspection technique for detecting sensitive data leakage. It involves aligning samples from sensitive data and content to compare similarity. Two algorithms are used - a comparable sampling algorithm and a sampling oblivious alignment algorithm. This alignment method promises high-speed security scanning while achieving high detection specificity and tolerance to pattern variation.
Related topics: