Trojan Taxonomy in Quantum Computing (2309.10981v1)
Abstract: Quantum computing introduces unfamiliar security vulnerabilities demanding customized threat models. Hardware and software Trojans pose serious concerns needing rethinking from classical paradigms. This paper develops the first structured taxonomy of Trojans tailored to quantum information systems. We enumerate potential attack vectors across the quantum stack from hardware to software layers. A categorization of quantum Trojan types and payloads is outlined ranging from reliability degradation, functionality corruption, backdoors, and denial-of-service. Adversarial motivations behind quantum Trojans are analyzed. By consolidating diverse threats into a unified perspective, this quantum Trojan taxonomy provides insights guiding threat modeling, risk analysis, detection mechanisms, and security best practices customized for this novel computing paradigm.
- D. Haagman and B. Ghavalas, “Trojan defence: A forensic view,” Digital Investigation, vol. 2, no. 1, pp. 23–30, 2005.
- S. Bhunia, M. S. Hsiao, M. Banga, and S. Narasimhan, “Hardware trojan attacks: Threat analysis and countermeasures,” Proceedings of the IEEE, vol. 102, no. 8, pp. 1229–1247, 2014.
- K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, and M. Tehranipoor, “Hardware trojans: Lessons learned after one decade of research,” ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 22, no. 1, pp. 1–23, 2016.
- Trust-Hub. (2023) Trust-hub. Accessed: 04 Sept. 2023. [Online]. Available: https://www.trust-hub.org/
- S. Das, A. Chatterjee, and S. Ghosh, “A first order survey of quantum supply dynamics and threat landscapes,” arXiv preprint arXiv:2308.09772, 2023.
- S. Ghosh, S. Upadhyay, and A. A. Saki, “A primer on security of quantum computing,” arXiv preprint arXiv:2305.02505, 2023.
- A. A. Saki, A. Suresh, R. O. Topaloglu, and S. Ghosh, “Split compilation for security of quantum circuits,” in 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD). IEEE, 2021, pp. 1–7.
- C. Chu, L. Jiang, M. Swany, and F. Chen, “Qtrojan: A circuit backdoor against quantum neural networks,” in ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2023, pp. 1–5.
- E. Huang, A. C. Doherty, and S. Flammia, “Performance of quantum error correction with coherent errors,” Physical Review A, vol. 99, no. 2, p. 022313, 2019.
Sponsor
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.