Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning (2306.16701v1)

Published 29 Jun 2023 in quant-ph and cs.CR

Abstract: Quantum computing holds tremendous potential for various applications, but its security remains a crucial concern. Quantum circuits need high-quality compilers to optimize the depth and gate count to boost the success probability on current noisy quantum computers. There is a rise of efficient but unreliable/untrusted compilers; however, they present a risk of tampering such as Trojan insertion. We propose TrojanNet, a novel approach to enhance the security of quantum circuits by detecting and classifying Trojan-inserted circuits. In particular, we focus on the Quantum Approximate Optimization Algorithm (QAOA) circuit that is popular in solving a wide range of optimization problems. We investigate the impact of Trojan insertion on QAOA circuits and develop a Convolutional Neural Network (CNN) model, referred to as TrojanNet, to identify their presence accurately. Using the Qiskit framework, we generate 12 diverse datasets by introducing variations in Trojan gate types, the number of gates, insertion locations, and compiler backends. These datasets consist of both original Trojan-free QAOA circuits and their corresponding Trojan-inserted counterparts. The generated datasets are then utilized for training and evaluating the TrojanNet model. Experimental results showcase an average accuracy of 98.80% and an average F1-score of 98.53% in effectively detecting and classifying Trojan-inserted QAOA circuits. Finally, we conduct a performance comparison between TrojanNet and existing machine learning-based Trojan detection methods specifically designed for conventional netlists.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. National Academies of Sciences, Engineering, and Medicine and others, “Quantum computing: progress and prospects,” 2019.
  2. L. Zhou, S.-T. Wang, S. Choi, H. Pichler, and M. D. Lukin, “Quantum approximate optimization algorithm: Performance, mechanism, and implementation on near-term devices,” Physical Review X, vol. 10, no. 2, p. 021067, 2020.
  3. M. Alam, A. Ash-Saki, and S. Ghosh, “Accelerating quantum approximate optimization algorithm using machine learning,” in 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).   IEEE, 2020, pp. 686–689.
  4. S. Upadhyay and S. Ghosh, “Obfuscating quantum hybrid-classical algorithms for security and privacy,” arXiv preprint arXiv:2305.02379, 2023.
  5. S. Das and S. Ghosh, “Randomized reversible gate-based obfuscation for secured compilation of quantum circuit,” arXiv preprint arXiv:2305.01133, 2023.
  6. R. Shaydulin, H. Ushijima-Mwesigwa, C. F. Negre, I. Safro, S. M. Mniszewski, and Y. Alexeev, “A hybrid approach for solving optimization problems on small quantum computers,” Computer, vol. 52, no. 6, pp. 18–26, 2019.
  7. Z. Computing, “Orquestra,” Apr 2023. [Online]. Available: https://www.zapatacomputing.com/orquestra-platform/
  8. C. Q. Computing, “Pytket,” Apr 2023. [Online]. Available: https://cqcl.github.io/tket/pytket/api/index.html
  9. M. A. Nielsen and I. Chuang, “Quantum computation and quantum information,” 2002.
  10. M. S. Anis, H. Abraham, R. A. AduOffei, G. Agliardi, M. Aharoni, I. Y. Akhalwaya, G. Aleksandrowicz, T. Alexander, M. Amy, S. Anagolum et al., “Qiskit: An open-source framework for quantum computing,” Qiskit/qiskit, 2021.
  11. G. E. Crooks, “Performance of the quantum approximate optimization algorithm on the maximum cut problem,” arXiv preprint arXiv:1811.08419, 2018.
  12. J. Håstad, “Some optimal inapproximability results,” Journal of the ACM (JACM), vol. 48, no. 4, pp. 798–859, 2001.
  13. H.-L. Huang, X.-Y. Xu, C. Guo, G. Tian, S.-J. Wei, X. Sun, W.-S. Bao, and G.-L. Long, “Near-term quantum computing techniques: Variational quantum algorithms, error mitigation, circuit compilation, benchmarking and classical simulation,” Science China Physics, Mechanics & Astronomy, vol. 66, no. 5, p. 250302, 2023.
  14. A. Suresh, A. A. Saki, M. Alam, D. S. Ghosh et al., “A quantum circuit obfuscation methodology for security and privacy,” arXiv preprint arXiv:2104.05943, 2021.
  15. A. A. Saki, A. Suresh, R. O. Topaloglu, and S. Ghosh, “Split compilation for security of quantum circuits,” in 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD).   IEEE, 2021, pp. 1–7.
Citations (1)

Summary

We haven't generated a summary for this paper yet.