Sensitive Information Detection and Governance in Binary Data Processing
DOI: https://doi.org/10.62517/jbdc.202501203
Author(s)
Jiahong Wang, Yibo Chang*
Affiliation(s)
College of Electronic Engineering, National University of Defense Technology, Hefei, Anhui, China
*Corresponding Author
Abstract
In the current era of rapid digital development, binary data, as the fundamental storage and transmission form in computer systems, faces increasingly prominent security issues. Binary data exists in various non-text forms like computer programs and encrypted data. Its unstructured nature and poor readability make it difficult to detect sensitive information using traditional text-based methods. This paper starts with the characteristics of binary data and deeply explores the definition, classification of information sensitivity, and its significant importance in binary data processing. Information sensitivity is crucial for measuring the potential harm of data leakage or abuse. It includes personal privacy data, business-critical assets, and national-security-related information. It studies the identification technologies based on data feature analysis and machine learning. In the information age, binary data serves as the core carrier of digital systems, playing a crucial role. It is widely applied in various fields such as file storage, network communication, and program execution. Binary data may contain a large amount of sensitive information. If it is leaked or misused, it is highly likely to lead to serious consequences. Given that binary data has the characteristics of being unstructured and having poor readability, traditional text-based sensitive information detection strategies cannot be directly implemented. How to efficiently identify the sensitive content within binary data and formulate scientific management plans has become a major issue in the field of network security. In this paper, in combination with computer technology, a systematic exploration is carried out on the methods for identifying and managing the information sensitivity within binary data.
Keywords
Binary Data; Information Sensitivity; Privacy Protection; Data Encryption; Access Control
References
[1]Simon D Duque Anton, Hans Dieter Schotten. Intrusion Detection in Binary Process Data: Introducing the Hamming-distance to Matrix Profiles. 2020,
[2]Hioki Hirohisa. Data Hiding for Text and Binary Files. Computational Linguistics, 2024.
[3]Langner, Paula R. CAa, Juarez-Colunga, et al. Efficiency loss with binary pre-processing of continuous monitoring data. Statistics in Biosciences, 2025.
[4]Or Ordentlich, Yury Polyanskiy. Strong Data Processing Constant Is Achieved by Binary Inputs. IEEE Transactions on Information Theory, 2022, 68(3): 1480-1481.
[5]Manh Khoi Duong, Stefan Conrad. Towards Fairness and Privacy: A Novel Data Pre-processing Optimization Framework for Non-binary Protected Attributes. 2024,
[6]Koeck, Philip J.B. philip.Koeck@csb.ki.se. Missing data in image and signal processing: The case of binary objects. Optik-International Journal for Light and Electron Optics, 2004, 115(10): 459-472.
[7]Mueller, bernd, gladigau, et al. Method and device for processing binary code Data: WO2017EP6310. 2017-12-28.
[8]Gomer H. Redmond, Dennis E. Mulvihill. The use of a binary computer for data processing//IRE-AIEE-ACM '60 (Eastern): Papers presented at the December 13-15, 1960, eastern joint IRE-AIEE-ACM computer conference. 1960.
[9]Wilkinson, james h. Processing binary DATA: CA374878A. 1983-08-09.
[10]Ive, John G.S., Ive John G S. Processing Binary Data: CA376263A. 1983-08-23.
[11]Jin Guo, Xuebin Wang, Yanling Zhang. System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy. Control Theory and Technology, 2022, 20(1): 127-138.