Trojan Taxonomy in Quantum Computing

09/20/2023
by   Subrata Das, et al.
0

Quantum computing introduces unfamiliar security vulnerabilities demanding customized threat models. Hardware and software Trojans pose serious concerns needing rethinking from classical paradigms. This paper develops the first structured taxonomy of Trojans tailored to quantum information systems. We enumerate potential attack vectors across the quantum stack from hardware to software layers. A categorization of quantum Trojan types and payloads is outlined ranging from reliability degradation, functionality corruption, backdoors, and denial-of-service. Adversarial motivations behind quantum Trojans are analyzed. By consolidating diverse threats into a unified perspective, this quantum Trojan taxonomy provides insights guiding threat modeling, risk analysis, detection mechanisms, and security best practices customized for this novel computing paradigm.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/27/2021

Cybersecurity for Quantum Computing

With rising cyberattack frequency and range, Quantum Computing companies...
research
04/07/2022

Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses

In the last few years, quantum computing has experienced a growth spurt....
research
07/30/2023

Full-Stack Quantum Software in Practice: Ecosystem, Stakeholders and Challenges

The emergence of quantum computing has introduced a revolutionary paradi...
research
05/06/2022

Understanding Quantum Software Engineering Challenges An Empirical Study on Stack Exchange Forums and GitHub Issues

With the advance in quantum computing, quantum software becomes critical...
research
07/07/2022

A Review of Quantum Cybersecurity: Threats, Risks and Opportunities

The promise of quantum computing is not speeding up conventional computi...
research
04/01/2018

A Novel Approach for Network Attack Classification Based on Sequential Questions

With the development of incipient technologies, user devices becoming mo...
research
01/18/2023

Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures

A thorough and systematic understanding of different elements of cyberat...

Please sign up or login with your details

Forgot password? Click here to reset