defense 2025

Cross-Service Threat Intelligence in LLM Services using Privacy-Preserving Fingerprints

Waris Gill , Natalie Isak , Matthew Dressman

0 citations

α

Published on arXiv

2509.05608

Prompt Injection

OWASP LLM Top 10 — LLM01

Key Finding

BinaryShield achieves F1-score of 0.94 for cross-service prompt injection fingerprint matching, outperforming SimHash (0.77) while delivering 64x storage reduction and 38x faster similarity search over dense embeddings

BinaryShield

Novel technique introduced


The widespread deployment of LLMs across enterprise services has created a critical security blind spot. Organizations operate multiple LLM services handling billions of queries daily, yet regulatory compliance boundaries prevent these services from sharing threat intelligence about prompt injection attacks, the top security risk for LLMs. When an attack is detected in one service, the same threat may persist undetected in others for months, as privacy regulations prohibit sharing user prompts across compliance boundaries. We present BinaryShield, the first privacy-preserving threat intelligence system that enables secure sharing of attack fingerprints across compliance boundaries. BinaryShield transforms suspicious prompts through a unique pipeline combining PII redaction, semantic embedding, binary quantization, and randomized response mechanism to potentially generate non-invertible fingerprints that preserve attack patterns while providing privacy. Our evaluations demonstrate that BinaryShield achieves an F1-score of 0.94, significantly outperforming SimHash (0.77), the privacy-preserving baseline, while achieving 64x storage reduction and 38x faster similarity search compared to dense embeddings.


Key Contributions

  • BinaryShield: first privacy-preserving threat intelligence system for cross-service sharing of prompt injection attack fingerprints across regulatory compliance boundaries
  • Novel fingerprinting pipeline combining PII redaction, semantic embedding, binary quantization, and randomized response to produce non-invertible attack-pattern-preserving fingerprints
  • 64x storage reduction and 38x faster similarity search versus dense embeddings, with F1=0.94 significantly outperforming SimHash baseline (F1=0.77)

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_timeblack_box
Applications
llm servicesenterprise ai deploymentsprompt injection detectioncross-service threat intelligence