Sept. 21, 2023, 1:10 a.m. | Subrata Das, Swaroop Ghosh

cs.CR updates on arXiv.org arxiv.org

Quantum computing introduces unfamiliar security vulnerabilities demanding
customized threat models. Hardware and software Trojans pose serious concerns
needing rethinking from classical paradigms. This paper develops the first
structured taxonomy of Trojans tailored to quantum information systems. We
enumerate potential attack vectors across the quantum stack from hardware to
software layers. A categorization of quantum Trojan types and payloads is
outlined ranging from reliability degradation, functionality corruption,
backdoors, and denial-of-service. Adversarial motivations behind quantum
Trojans are analyzed. By consolidating diverse threats …

attack attack vectors computing hardware information quantum quantum computing security serious software stack systems threat threat models trojan trojans vulnerabilities

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605