A new technical paper titled “Hardware trojans in superconducting electronic circuits” was published by researchers at University of Rochester.
Abstract
“Hardware Trojans that exploit the unique characteristics of superconducting electronic (SCE) circuits are explored in this paper. Two types of hardware Trojan circuits are proposed: a magnetically-coupled data transmission Trojan embedded in single flux quantum (SFQ) full adder circuit and a pulse-interleaved Trojan implemented within a frequency divider. The working principles of how these Trojan circuits exploit the frequency-sensitive nature of SCE circuits are explained. The proposed Trojan circuits stay hidden during typical low-frequency testing, and only triggered and become active (and potentially dangerous) at higher frequencies. Extensive analysis demonstrate that these Trojans have a high chance of staying stealthy during testing, underscoring the need for more comprehensive security measures that account for the full range of operating frequencies for the protection of both classical superconducting systems and future quantum technologies.”
Find the technical paper here. July 2025. [Accepted manuscript]
Adedokun, Ayisat Folasade, Yerzhan Mustafa, and Selçuk Köse. “Hardware trojans in superconducting electronic circuits.” Superconductor Science and Technology (2025). Creative Commons license.
Ayisat Folasade Adedokun et al 2025 Supercond. Sci. Technol. in press https://doi.org/10.1088/1361- 6668/adeb38
Leave a Reply