TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning
- URL: http://arxiv.org/abs/2306.16701v1
- Date: Thu, 29 Jun 2023 05:56:05 GMT
- Title: TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning
- Authors: Subrata Das, Swaroop Ghosh
- Abstract summary: TrojanNet is a novel approach to enhance the security of quantum circuits by detecting and classifying Trojan-inserted circuits.
We generate 12 diverse datasets by introducing variations in Trojan gate types, the number of gates, insertion locations, and compilers.
Experimental results showcase an average accuracy of 98.80% and an average F1-score of 98.53% in effectively detecting and classifying Trojan-inserted QAOA circuits.
- Score: 5.444459446244819
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Quantum computing holds tremendous potential for various applications, but
its security remains a crucial concern. Quantum circuits need high-quality
compilers to optimize the depth and gate count to boost the success probability
on current noisy quantum computers. There is a rise of efficient but
unreliable/untrusted compilers; however, they present a risk of tampering such
as Trojan insertion. We propose TrojanNet, a novel approach to enhance the
security of quantum circuits by detecting and classifying Trojan-inserted
circuits. In particular, we focus on the Quantum Approximate Optimization
Algorithm (QAOA) circuit that is popular in solving a wide range of
optimization problems. We investigate the impact of Trojan insertion on QAOA
circuits and develop a Convolutional Neural Network (CNN) model, referred to as
TrojanNet, to identify their presence accurately. Using the Qiskit framework,
we generate 12 diverse datasets by introducing variations in Trojan gate types,
the number of gates, insertion locations, and compiler backends. These datasets
consist of both original Trojan-free QAOA circuits and their corresponding
Trojan-inserted counterparts. The generated datasets are then utilized for
training and evaluating the TrojanNet model. Experimental results showcase an
average accuracy of 98.80% and an average F1-score of 98.53% in effectively
detecting and classifying Trojan-inserted QAOA circuits. Finally, we conduct a
performance comparison between TrojanNet and existing machine learning-based
Trojan detection methods specifically designed for conventional netlists.
Related papers
- TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans [21.7375312616769]
TroLLoc is a novel scheme for IC security closure that employs, for the first time, logic locking and layout hardening in unison.
We show that TroLLoc successfully renders layouts resilient, with reasonable overheads, against (i.e., general prospects for Trojan insertion as in the ISPD'22 contest, (ii) actual Trojan insertion as in the ISPD'23 contest, and (iii) potential second-order attacks.
arXiv Detail & Related papers (2024-05-09T07:25:38Z) - Hardware Trojans in Quantum Circuits, Their Impacts, and Defense [2.089191490381739]
Circuits with a short depth and lower gate count can yield the correct solution more often than the variant with a higher gate count and depth.
Many 3rd party compilers are being developed for lower compilation time, reduced circuit depth, and lower gate count for large quantum circuits.
arXiv Detail & Related papers (2024-02-02T16:44:52Z) - Trojan Taxonomy in Quantum Computing [2.348041867134616]
Quantum computing introduces unfamiliar security vulnerabilities demanding customized threat models.
This paper develops the first structured taxonomy of Trojans tailored to quantum information systems.
A categorization of quantum Trojan types and payloads is outlined ranging from reliability degradation, functionality corruption, backdoors, and denial-of-service.
arXiv Detail & Related papers (2023-09-20T00:42:21Z) - QTrojan: A Circuit Backdoor Against Quantum Neural Networks [7.159964195773199]
We propose a circuit-level backdoor attack, textitQTrojan, against Quantum Neural Networks (QNNs)
QTrojan is implemented by few quantum gates inserted into the variational quantum circuit of the victim QNN.
arXiv Detail & Related papers (2023-02-16T05:06:10Z) - Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips [51.17948837118876]
We present hardly perceptible Trojan attack (HPT)
HPT crafts hardly perceptible Trojan images by utilizing the additive noise and per pixel flow field.
To achieve superior attack performance, we propose to jointly optimize bit flips, additive noise, and flow field.
arXiv Detail & Related papers (2022-07-27T09:56:17Z) - Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free [126.15842954405929]
Trojan attacks threaten deep neural networks (DNNs) by poisoning them to behave normally on most samples, yet to produce manipulated results for inputs attached with a trigger.
We propose a novel Trojan network detection regime: first locating a "winning Trojan lottery ticket" which preserves nearly full Trojan information yet only chance-level performance on clean inputs; then recovering the trigger embedded in this already isolated subnetwork.
arXiv Detail & Related papers (2022-05-24T06:33:31Z) - Practical Detection of Trojan Neural Networks: Data-Limited and
Data-Free Cases [87.69818690239627]
We study the problem of the Trojan network (TrojanNet) detection in the data-scarce regime.
We propose a data-limited TrojanNet detector (TND), when only a few data samples are available for TrojanNet detection.
In addition, we propose a data-free TND, which can detect a TrojanNet without accessing any data samples.
arXiv Detail & Related papers (2020-07-31T02:00:38Z) - Cassandra: Detecting Trojaned Networks from Adversarial Perturbations [92.43879594465422]
In many cases, pre-trained models are sourced from vendors who may have disrupted the training pipeline to insert Trojan behaviors into the models.
We propose a method to verify if a pre-trained model is Trojaned or benign.
Our method captures fingerprints of neural networks in the form of adversarial perturbations learned from the network gradients.
arXiv Detail & Related papers (2020-07-28T19:00:40Z) - Odyssey: Creation, Analysis and Detection of Trojan Models [91.13959405645959]
Trojan attacks interfere with the training pipeline by inserting triggers into some of the training samples and trains the model to act maliciously only for samples that contain the trigger.
Existing Trojan detectors make strong assumptions about the types of triggers and attacks.
We propose a detector that is based on the analysis of the intrinsic properties; that are affected due to the Trojaning process.
arXiv Detail & Related papers (2020-07-16T06:55:00Z) - An Embarrassingly Simple Approach for Trojan Attack in Deep Neural
Networks [59.42357806777537]
trojan attack aims to attack deployed deep neural networks (DNNs) relying on hidden trigger patterns inserted by hackers.
We propose a training-free attack approach which is different from previous work, in which trojaned behaviors are injected by retraining model on a poisoned dataset.
The proposed TrojanNet has several nice properties including (1) it activates by tiny trigger patterns and keeps silent for other signals, (2) it is model-agnostic and could be injected into most DNNs, dramatically expanding its attack scenarios, and (3) the training-free mechanism saves massive training efforts compared to conventional trojan attack methods.
arXiv Detail & Related papers (2020-06-15T04:58:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.