1: \begin{abstract}
2: In today's data-driven world, the proliferation of publicly available information raises security concerns due to the \ac{IL} problem.
3: \ac{IL} involves unintentionally exposing sensitive information to unauthorized parties via observable system information.
4: Conventional statistical approaches rely on estimating \ac{MI} between observable and secret information for detecting \acp{IL}, face challenges of the curse of dimensionality, convergence, computational complexity, and \ac{MI} misestimation.
5: Though effective, emerging supervised \acl{ML} based approaches to detect \acp{IL} are limited to binary system sensitive information and lack a comprehensive framework.
6: To address these limitations, we establish a theoretical framework using \slt and \ite to quantify and detect \ac{IL} accurately.
7: Using \acl{AutoML}, we demonstrate that \ac{MI} can be accurately estimated by approximating the typically unknown Bayes predictor's log-loss and accuracy.
8: Based on this, we show how \ac{MI} can effectively be estimated to detect \acp{IL}. Our method performs superior to state-of-the-art baselines in an empirical study considering synthetic and real-world OpenSSL TLS server datasets.
9: %We compare our \ac{MI} estimation approaches against current baselines on synthetic datasets generated using a \acl{MVN} distribution with known \ac{MI}.
10: %We introduce a cut-off technique using a one-sided statistical test to detect \ac{IL} and employ the Holm-Bonferroni correction to increase confidence in detection decisions.
11: %Our study evaluates \acl{ILD} approaches on real-world OpenSSL TLS Server data, and highlights the superiority of \ac{MI} estimation using \llmis in accurately detecting \acp{IL} and estimating \ac{MI} in synthetic datasets.
12: \end{abstract}
13: