AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance
Abstract
1. Introduction
2. Background and Related Work
2.1. AI Supply Chain Risks
2.2. Cryptographic Foundations of AI Assurance
2.3. Post-Quantum Cryptography Transition Requirements
2.4. Gaps in Existing Frameworks
3. Materials and Methods
3.1. Research Design and Contribution Type
3.2. Analytical Propositions
3.3. Search Strategy
3.4. Eligibility Criteria
3.5. Screening and Selection
3.6. Data Extraction and Coding
3.7. Evidence Confidence Tiers
3.8. Requirements-to-Architecture Traceability
4. Synthesis of Threats and Derived Requirements
4.1. AI Supply Chain Attack Surface
4.1.1. Training-Time Threats
4.1.2. Ingestion-Time Threats
4.1.3. Deployment-Time Threats
4.2. Cryptographic Dependencies in AI Pipelines
4.2.1. Model Signing and Verification
4.2.2. Dataset Integrity and Lineage
4.2.3. Secure Training and Deployment Pipelines
4.2.4. Federated Learning and Distributed Training
4.3. Lifecycle Vulnerabilities Across AI Supply Chains
4.3.1. Pre-Training
4.3.2. Fine-Tuning
4.3.3. Packaging and Distribution
4.3.4. Deployment and Continuous Learning
4.4. Requirements Derived from Threats and Dependencies
4.4.1. Provenance Requirements
4.4.2. Integrity Requirements
4.4.3. Lifecycle Requirements
4.4.4. Supply Chain Transparency Requirements
5. MBOM-PQC: Proposed Provenance Schema
5.1. Design Principles
5.1.1. Completeness
5.1.2. Verifiability
5.1.3. Cryptographic Durability
5.1.4. Supply Chain Transparency
5.2. Schema Overview and Core Components
5.2.1. Component 1: Model Metadata
5.2.2. Component 2: Pre-Training Dataset Lineage
5.2.3. Component 3: Pre-Trained Model Dependencies
5.2.4. Component 4: Fine-Tuning Artifacts
5.2.5. Component 5: Training Environment and Pipeline
5.2.6. Component 6: Deployment Packaging
5.2.7. Component 7: Cryptographic Integrity Fields
5.3. PQC-Safe Extensions
5.3.1. Hybrid Signature Bundles
5.3.2. PQC-Safe Certificate Chain Fields
5.3.3. Long-Term Integrity Anchors
5.4. Requirements-to-Schema Traceability
5.5. Summary
6. PQC-Safe Signing and Attestation: Proposed Pipeline
6.1. Pipeline Overview
6.1.1. Stage 1—Ingestion
6.1.2. Stage 2—Verification
6.1.3. Stage 3—Signing
6.1.4. Stage 4—Attestation
6.1.5. Stage 5—Deployment
6.2. PQC-Safe Signing Flow
6.2.1. Hybrid Mode Signing
6.2.2. FIPS 204 (ML-DSA) Signing for Standard Artifacts
6.2.3. FIPS 205 (SLH-DSA) for Long-Term Artifacts
6.2.4. PQC-Safe Key Management
6.2.5. Worked Example: 110M-Parameter Transformer Checkpoint
6.3. Attestation Architecture
6.3.1. Hardware Root of Trust
6.3.2. PQC-Safe Certificate Chains
6.3.3. Remote Attestation
6.4. Integration with Zero Trust Architecture and AI RMF
6.4.1. Zero Trust Architecture Integration
6.4.2. AI RMF Integration
6.5. Continuous-Learning Pipeline Modes
7. SCAMM: Proposed Maturity Model
7.1. SCAMM Overview

| Dimension | Sub-Indicator | Default Weight |
|---|---|---|
| D_prov (Provenance Completeness) | Model metadata coverage | 0.20 |
| Pre-training dataset lineage coverage | 0.30 | |
| Pre-trained model dependency coverage | 0.20 | |
| Fine-tuning artifact coverage | 0.20 | |
| Deployment packaging dependency coverage | 0.10 | |
| D_crypto (Cryptographic Integrity) | Proportion of artifacts with PQC-safe signatures | 0.40 |
| Proportion with hybrid signature bundles | 0.20 | |
| Certificate-chain validity rate | 0.20 | |
| Cryptographic agility readiness score | 0.20 | |
| D_attest (Pipeline Attestation) | Build attestation coverage | 0.40 |
| Training pipeline attestation coverage | 0.30 | |
| Deployment and runtime attestation cadence | 0.30 | |
| D_gov (Lifecycle Governance) | Audit trail completeness | 0.30 |
| Risk analysis frequency | 0.20 | |
| Mitigation plan currency | 0.20 | |
| Zero Trust controls alignment | 0.30 |
| Level | τ_prov | τ_crypto | τ_attest | τ_gov |
|---|---|---|---|---|
| L1 (Ad Hoc) | 0.00 | 0.00 | 0.00 | 0.00 |
| L2 (Documented) | 0.50 | 0.40 | 0.30 | 0.50 |
| L3 (Cryptographically Verified) | 0.70 | 0.65 | 0.55 | 0.70 |
| L4 (PQC-Safe) | 0.85 | 0.85 | 0.85 | 0.85 |
| L5 (Continuously Attested) | 0.95 | 0.95 | 0.95 | 0.95 |
7.2. Maturity Level Definitions
7.3. SCAMM Indicators and Metrics
7.3.1. Provenance Completeness
7.3.2. Cryptographic Integrity
7.3.3. Pipeline Attestation
7.3.4. Lifecycle Governance
7.3.5. Scoring Methodology
7.4. Requirements-to-Maturity Mapping
7.5. Summary
8. Discussion
8.1. Implications for AI Governance and Risk Management
8.2. Integration with Zero Trust Architecture and Enterprise Security
8.3. Implementation Challenges
8.3.1. Performance and Storage Overhead
8.3.2. Legacy System Compatibility
8.3.3. Provenance Completeness Challenges in Practice
8.3.4. Organizational Maturity and Skill Gaps
8.3.5. Performance Overhead Across Model Scales
8.3.6. Hardware Root-of-Trust Migration: Cost and Compatibility
8.4. Limitations of the Proposed Framework
8.4.1. Evolving PQC Standards
8.4.2. Lack of Empirical Validation
8.4.3. Dependency on Upstream Transparency
8.4.4. Continuous-Learning Open Questions
8.4.5. Empirical Validation Roadmap
8.5. Critical Considerations and Boundary Conditions
8.5.1. Where MBOM-PQC May Be Over-Engineered
8.5.2. Ecosystem Conditions That May Not Materialize
8.5.3. Illustrative Scenarios
8.6. Opportunities for Future Research
8.7. Summary
9. Conclusions
Supplementary Materials
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| AI | Artificial Intelligence |
| AP | Analytical Proposition |
| ATO | Authorization to Operate |
| AVX2 | Advanced Vector Extensions 2 |
| CNSA | Commercial National Security Algorithm Suite |
| CSF | Cybersecurity Framework |
| CVE | Common Vulnerabilities and Exposures |
| ECDSA | Elliptic Curve Digital Signature Algorithm |
| FIPS | Federal Information Processing Standards |
| HNDL | Harvest-Now, Decrypt-Later |
| HNFL | Harvest-Now, Forge-Later |
| HRoT | Hardware Root of Trust |
| HSM | Hardware Security Module |
| IETF | Internet Engineering Task Force |
| ISO/IEC | International Organization for Standardization/International Electrotechnical Commission |
| MBOM | Model Bill of Materials |
| ML-DSA | Module-Lattice-Based Digital Signature Algorithm |
| ML-KEM | Module-Lattice-Based Key-Encapsulation Mechanism |
| NIST | National Institute of Standards and Technology |
| NSA | National Security Agency |
| NSS | National Security System |
| OMB | Office of Management and Budget |
| PQC | Post-Quantum Cryptography |
| PRISMA | Preferred Reporting Items for Systematic reviews and Meta-Analyses |
| SBOM | Software Bill of Materials |
| SCAMM | Supply Chain Assurance Maturity Model |
| SLH-DSA | Stateless Hash-Based Digital Signature Algorithm |
| SSDF | Secure Software Development Framework |
| TPM | Trusted Platform Module |
| ZTA | Zero Trust Architecture |
Appendix A. Full 54-Source Evidence Bibliography
| ID | Tier | Type | Full Citation | Ref. |
|---|---|---|---|---|
| S01 | A | Policy/Std | NIST. AI RMF 1.0; 2023. | [1] |
| S02 | A | Policy/Std | NIST. ML-KEM (FIPS 203); 2024. | [2] |
| S03 | A | Policy/Std | NIST. ML-DSA (FIPS 204); 2024. | [3] |
| S04 | A | Policy/Std | NIST. SLH-DSA (FIPS 205); 2024. | [4] |
| S05 | A | Policy/Std | NSA. CNSA 2.0; 2022. | [5] |
| S06 | A | Policy/Std | NIST. SSDF v1.1 (SP 800-218); 2022. | [6] |
| S07 | A | Policy/Std | NIST. SP 800-208 (XMSS/LMS); 2020. | [7] |
| S08 | A | Policy/Std | NIST. SP 800-204D; 2024. | [8] |
| S09 | B | Policy/Std | DoD CDAO. RAI Toolkit; 2024. | [9] |
| S10 | A | Policy/Std | IETF. Hybrid Key Exchange TLS 1.3; draft-16; 2026. (Work in Progress) | [10] |
| S11 | A | Policy/Std | IETF. PQ Hybrid ECDHE-MLKEM TLS 1.3; draft-04; 2026. (Work in Progress) | [11] |
| S12 | A | Peer-Rev | Carlini et al. Poisoning Web-Scale Datasets. IEEE S&P 2023. | [12] |
| S13 | A | Peer-Rev | Goldblum et al. Dataset Security for ML. ACM Comput. Surv. 2024. | [13] |
| S14 | A | Peer-Rev | Machado et al. Adversarial ML in Image Classification. ACM Comput. Surv. 2023. | [14] |
| S15 | A | Peer-Rev | Pearce et al. Model Inversion/Extraction/SC. IEEE TDSC 2024. | [15] |
| S16 | A | Peer-Rev | Wu et al. BackdoorBench. NeurIPS 2022. | [16] |
| S17 | A | Incident | ReversingLabs. Malicious ML Packages PyPI; 2023. | [17] |
| S18 | A | Incident | PyTorch. TorchServe Advisory CVE-2023-43654; 2023. | [18] |
| S19 | B | Incident | CISA. SW Supply Chain Attacks; 2023. | [19] |
| S20 | A | Peer-Rev | Liu et al. Model Watermarking Survey. IEEE TNNLS 2024. | [20] |
| S21 | A | Peer-Rev | Rieger et al. DeepSight. NDSS 2022. | [21] |
| S22 | B | Peer-Rev | Kumar et al. Secure AI/ML. Microsoft 2023. | [22] |
| S23 | B | Policy/Std | Google. SAIF; 2023. | [25] |
| S24 | A | Policy/Std | NIST. SP 800-193 (FW Resiliency); 2022. | [26] |
| S25 | B | Incident | Red Hat. Securing AI Models/Containers; 2025. | [27] |
| S26 | A | Policy/Std | MITRE. ATLAS; 2024. | [28] |
| S27 | A | Policy/Std | NIST. SP 800-207 (ZTA); 2020. | [29] |
| S28 | A | Peer-Rev | Page et al. PRISMA 2020. BMJ 2021. | [30] |
| ID | Tier | Type | Full Citation |
|---|---|---|---|
| S29 | A | Policy/Std | NIST. SP 800-218A: Secure Software Dev Practices for GenAI; NIST, 2024. |
| S30 | A | Policy/Std | NIST. AI 600-1: AI RMF Generative AI Profile; NIST, 2024. |
| S31 | A | Policy/Std | NIST. SP 800-161r1: C-SCRM Practices; NIST, 2022 (updated 2024). |
| S32 | A | Policy/Std | NIST. Cybersecurity Framework (CSF) 2.0; NIST, 2024. |
| S33 | A | Policy/Std | Executive Order 14110: Safe, Secure, and Trustworthy AI; The White House, 2023. |
| S34 | A | Policy/Std | NIST. SP 800-53 Rev. 5: Security and Privacy Controls; NIST, 2020. |
| S35 | A | Policy/Std | IETF. X.509 PKI Algorithm Identifiers for ML-DSA; RFC 9881, 2025. |
| S36 | A | Policy/Std | IETF. Composite ML-DSA for X.509 PKI; Internet-Draft, IETF LAMPS WG. |
| S37 | B | Policy/Std | OWASP. ML Security Top 10 (ML06: Supply Chain Attacks); 2023. |
| S38 | B | Policy/Std | OWASP. LLM Top 10 v2025: LLM03 Supply Chain; GenAI Security Project, 2025. |
| S39 | A | Policy/Std | ISO/IEC 42001:2023. AI Management System Standard; ISO, 2023. |
| S40 | A | Policy/Std | ISO/IEC 23894:2023. AI Guidance on Risk Management; ISO, 2023. |
| S41 | A | Policy/Std | CISA. Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default; April 2023. |
| S42 | A | Policy/Std | NSA/CISA. Deploying AI Systems Securely; 2024. |
| S43 | A | Policy/Std | NIST. SP 800-207A: ZTA Model for Cloud-Native Apps; NIST, 2023. |
| S44 | B | Policy/Std | DoD. Data, Analytics, and AI Adoption Strategy; 2023. |
| S45 | A | Policy/Std | OMB. M-23-02: Migrating to Post-Quantum Cryptography; OMB, 2022. Implements NSM-10. |
| S46 | A | Policy/Std | OWASP CycloneDX/Ecma TC54. CycloneDX BOM Standard (ECMA-424); paired with v1.5 Spec, 2023. |
| S47 | A | Peer-Rev | Gu et al. BadNets: Identifying Vulnerabilities in ML Supply Chain. IEEE Access 2019. |
| S48 | A | Peer-Rev | Li et al. Anti-Backdoor Learning. NeurIPS 2021. |
| S49 | A | Peer-Rev | Ohm et al. Backstabber’s Knife Collection: OSS SC Attacks. DIMVA 2020. |
| S50 | A | Peer-Rev | Ladisa et al. Taxonomy of Attacks on OSS Supply Chains. IEEE S&P 2023. |
| S51 | B | Incident | PyTorch Foundation. Compromised PyTorch-nightly Dependency Chain, Dec 2022. |
| S52 | B | Incident | Hugging Face. Hub Security: Pickle Scanning, Malware Scanning, Repository Trust Controls; 2024. |
| S53 | B | Incident | Ultralytics. GitHub Issue #18027: Wheel 8.3.41 compromise, XMRig miner injection; Dec 2024. |
| S54 | A | Peer-Rev | Zhu et al. Models Are Codes: Malicious Code Poisoning on Pre-trained Model Hubs. ACM ASE 2024. |
Appendix B. Review Method Summary
| Category | Description |
|---|---|
| Review objective | Identify and synthesize evidence relevant to AI SC integrity, provenance, PQC-safe signing/attestation, and maturity assessment |
| Review design | Structured evidence synthesis with prescriptive architectural derivation (design-oriented) |
| Timeframe | January–December 2025; targeted updates during revision where necessary |
| Included source classes | Policy/standards; peer-reviewed papers; documented SC incidents; implementation guidance |
| Core domains | AI SC security; provenance; attestation; PQC; secure software dev; ZTA; maturity assessment |
| Inclusion basis | Direct relevance to AP1–AP4; extractable normative, technical, architectural, or incident evidence |
| Exclusion basis | E1: No verifiable provenance; E2: no extractable content; E3: superseded; E4: not transferable |
| Records identified | 142 |
| Duplicates removed | 19 |
| Title/abstract screened | 123 |
| Full-text reviewed | 76 |
| Included in synthesis | 54 |
| Final composition | 31 policy/standards; 15 peer-reviewed; 8 incidents |
| Directly cited | 28 |
| Synthesis-informing only | 26 |
| ID | Type | Tier | Domain | AP | Requirements | Crypto Params | Vulns/Attacks | Limitations | Status |
|---|---|---|---|---|---|---|---|---|---|
| S01 | Policy/Std | A | AI/Gov | AP3 | AI governance; Map/Measure/Manage/Govern | N/A | N/A | No crypto or provenance specs | Cited |
| S02 | Policy/Std | A | Crypto/PQC | AP2 | ML-KEM parameter sets; key encapsulation | ML-KEM-512/768/1024 | N/A | KEM only; not signing | Cited |
| S03 | Policy/Std | A | Crypto/PQC | AP2 | ML-DSA parameter sets; signature sizes | ML-DSA-44: 2420 B; -65: 3309 B; -87: 4627 B | N/A | Evolving param guidance | Cited |
| S04 | Policy/Std | A | Crypto/PQC | AP2 | SLH-DSA parameter sets; hash-based sigs | SLH-DSA-128s: ~7856 B; -256f: ~49,856 B | N/A | Large signature sizes | Cited |
| S05 | Policy/Std | A | Crypto/PQC | AP2, AP4 | CNSA 2.0 timelines; ML-DSA for NSS | ML-DSA for sigs; ML-KEM for KEM | N/A | NSS-specific; no AI guidance | Cited |
| S06 | Policy/Std | A | Supply Chain | AP3 | SSDF secure dev practices; SC integrity | N/A | N/A | No AI-specific artifacts | Cited |
| S07 | Policy/Std | A | Crypto/PQC | AP2 | XMSS/LMS stateful hash signatures | XMSS/LMS key/sig sizes | State mgmt complexity | Stateful; not general signing | Cited |
| S08 | Policy/Std | A | Supply Chain | AP3, AP4 | DevSecOps CI/CD SC security controls | N/A | N/A | No AI-specific provenance | Cited |
| S09 | Policy/Std | B | AI/Gov | AP3 | DoD RAI ethical/operational considerations | N/A | N/A | No crypto integrity guidance | Cited |
| S10 | Policy/Std | A | Crypto/PQC | AP4 | Hybrid TLS 1.3 key exchange design | Hybrid KEM constructions | N/A | Active I-D; WIP; key exchange only | Cited |
| S11 | Policy/Std | A | Crypto/PQC | AP4 | PQ Hybrid ECDHE-MLKEM for TLS 1.3 | ECDHE + ML-KEM hybrid | N/A | Active I-D; WIP; key exchange only | Cited |
| S12 | Peer-Rev | A | AI SC | AP1 | Web-scale dataset poisoning feasibility | N/A | Large-scale poisoning demonstrated | Research environment only | Cited |
| S13 | Peer-Rev | A | AI SC | AP1 | Dataset security taxonomy; poisoning/backdoor | N/A | Comprehensive attack/defense catalog | Survey scope; limited PQC | Cited |
| S14 | Peer-Rev | A | AI SC | AP1 | Adversarial ML attack/defense taxonomy; defender perspective | N/A | Evasion, poisoning, extraction | Image classification focus | Cited |
| S15 | Peer-Rev | A | AI SC | AP1 | Model inversion, extraction, SC attacks | N/A | Model theft; SC compromise | Limited crypto focus | Cited |
| S16 | Peer-Rev | A | AI SC | AP1 | BackdoorBench: controlled backdoor eval | Benchmark metrics | 8 backdoor attack methods | Controlled env; not operational | Cited |
| S17 | Incident | A | AI SC | AP1 | Malicious ML packages targeting PyPI devs | N/A | Dependency confusion; data exfil | Single incident class | Cited |
| S18 | Incident | A | AI SC | AP1 | TorchServe SSRF/model loading vulns | N/A | SSRF; arbitrary model loading | Single CVE | Cited |
| S19 | Incident | B | AI SC | AP1 | SW supply chain threat landscape overview | N/A | Multi-vector SC attacks | Broad scope; limited AI-specific | Cited |
| S20 | Peer-Rev | A | AI SC | AP1, AP3 | Model watermarking/provenance survey | Watermark embedding params | Provenance tracking limitations | No PQC consideration | Cited |
| S21 | Peer-Rev | A | AI SC | AP1 | DeepSight: backdoor detection in FL | Model inspection metrics | Federated backdoor injection | Federated-specific | Cited |
| S22 | Peer-Rev | B | AI SC | AP1, AP3 | Microsoft AI/ML security research & tooling | N/A | Counterfit; threat modeling | Industry report; not standard | Cited |
| S23 | Policy/Std | B | AI/Gov | AP3 | Google SAIF: secure AI framework principles | N/A | SC integrity identified | No implementation specs | Cited |
| S24 | Policy/Std | A | Cross-cut | AP4 | Platform firmware resiliency; HW root of trust | TPM/firmware measurement | N/A | Not AI-specific | Cited |
| S25 | Incident | B | AI SC | AP1 | Securing AI models/container images in SC | Container signing; model dist | Model tampering during dist | Blog; limited depth | Cited |
| S26 | Policy/Std | A | AI SC | AP1 | ATLAS: adversarial threat landscape for AI | N/A | 12+ AI-specific attack techniques | Evolving taxonomy | Cited |
| S27 | Policy/Std | A | Cross-cut | AP4 | Zero Trust Architecture principles | N/A | N/A | No AI or PQC guidance | Cited |
| S28 | Peer-Rev | A | Method | N/A | PRISMA 2020 systematic review guidelines | N/A | N/A | General methodology | Cited |
| S29 | Policy/Std | A | AI SC | AP3 | SSDF GenAI profile; AI-specific dev practices | N/A | Training data poisoning; model tampering | Final NIST publication | Synth |
| S30 | Policy/Std | A | AI/Gov | AP3 | GenAI risk profile; 12 GAI risk categories | N/A | Confabulation; CBRN; data privacy | GenAI-specific supplement | Synth |
| S31 | Policy/Std | A | Supply Chain | AP3, AP4 | C-SCRM practices; multilevel risk mgmt | N/A | Counterfeit; malicious insertion | No AI-specific artifacts | Synth |
| S32 | Policy/Std | A | Cross-cut | AP3 | CSF 2.0 core functions; SC category | N/A | N/A | Framework-level; no AI specifics | Synth |
| S33 | Policy/Std | A | AI/Gov | AP3 | Federal AI safety/security mandates | N/A | N/A | Executive directive; not technical | Synth |
| S34 | Policy/Std | A | Cross-cut | AP4 | Security/privacy controls catalog; SR family | N/A | N/A | General controls; no AI/PQC | Synth |
| S35 | Policy/Std | A | Crypto/PKI | AP2, AP4 | X.509 ML-DSA algorithm identifiers; cert profile | PQC cert encoding sizes | N/A | Published RFC; ML-DSA specific | Synth |
| S36 | Policy/Std | A | Crypto/PKI | AP2, AP4 | Composite ML-DSA signature format; dual-alg certs | Composite ML-DSA + ECDSA | N/A | Active IETF LAMPS WG draft | Synth |
| S37 | Policy/Std | B | AI SC | AP1 | ML SC attack taxonomy; OWASP ML Top 10 | N/A | 6 ML attack categories | Community project; not standard | Synth |
| S38 | Policy/Std | B | AI SC | AP1 | LLM SC risks; model hub compromise | N/A | Poisoned models; LoRA backdoors | GenAI-focused; emerging | Synth |
| S39 | Policy/Std | A | AI/Gov | AP3 | AI management system requirements | N/A | N/A | No crypto or provenance specs | Synth |
| S40 | Policy/Std | A | AI/Gov | AP3 | AI risk management guidance | N/A | N/A | No supply chain specifics | Synth |
| S41 | Policy/Std | A | AI SC | AP3 | Secure-by-design principles & approaches | N/A | N/A | Guidance-level; no implementation | Synth |
| S42 | Policy/Std | A | AI SC | AP3, AP4 | AI deployment security; model validation | N/A | Model tampering; adversarial inputs | Joint NSA/CISA; authoritative | Synth |
| S43 | Policy/Std | A | Cross-cut | AP4 | ZTA for cloud-native; trust scoring | N/A | N/A | Cloud-specific ZTA extension | Synth |
| S44 | Policy/Std | B | AI/Gov | AP3 | DoD AI adoption priorities | N/A | N/A | Strategic; not technical | Synth |
| S45 | Policy/Std | A | Crypto/PQC | AP2, AP4 | Federal PQC migration mandate under NSM-10 | N/A | N/A | Federal directive; no AI artifacts | Synth |
| S46 | Policy/Std | A | Supply Chain | AP3 | CycloneDX BOM Standard (ECMA-424); ML-BOM | SBOM/ML-BOM field defs | N/A | Limited PQC integration | Synth |
| S47 | Peer-Rev | A | AI SC | AP1 | BadNets: backdoor vulnerability in ML SC | N/A | Trojan injection via training data | 2019; foundational | Synth |
| S48 | Peer-Rev | A | AI SC | AP1 | Anti-backdoor learning; training on poisoned data | Defense effectiveness metrics | Backdoor detection/mitigation | Defense-focused | Synth |
| S49 | Peer-Rev | A | Supply Chain | AP1 | OSS SC attack taxonomy (174 packages) | N/A | Typosquatting; dep confusion | 2020; software-focused | Synth |
| S50 | Peer-Rev | A | Supply Chain | AP1 | Comprehensive taxonomy of OSS SC attacks | N/A | 107 attack vectors cataloged | Software-centric; limited AI | Synth |
| S51 | Incident | B | AI SC | AP1 | Compromised PyTorch-nightly dep chain, Dec 2022 | N/A | Dependency confusion; data exfil | Single incident; December 2022 | Synth |
| S52 | Incident | B | AI SC | AP1 | HF Hub Security: pickle/malware scanning | N/A | Unsafe deserialization; repo compromise | Platform-specific | Synth |
| S53 | Incident | B | AI SC | AP1 | Ultralytics wheel 8.3.41 compromise; XMRig | N/A | Build pipeline injection | Single incident; December 2024 | Synth |
| S54 | Peer-Rev | A | AI SC | AP1 | Malicious code poisoning on model hubs | N/A | Model hub code injection measured | Conference paper; 2024 | Synth |
Appendix C. Exclusion and Supersession Ledger
| Source Description | Code | Stage | Rationale | Superseded By |
|---|---|---|---|---|
| Generic AI ethics framework | E4 | Full-text | Addresses fairness/governance; not provenance, integrity, or crypto assurance | N/A |
| Early federated-learning privacy paper | E4 | Full-text | Privacy-preserving computation; not SC integrity or artifact trust | N/A |
| Pre-2020 adversarial ML study superseded by newer surveys | E3 | Full-text | Findings subsumed by more comprehensive recent reviews | S12, S14 |
| NIST SP 800-63B (Digital Identity Guidelines) | E4 | Full-text | Authentication/identity; not AI SC or model provenance | N/A |
| Preliminary AI watermarking workshop report | E2 | Full-text | Identifies gap; no extractable specifications | S20 |
| AI safety benchmark (behavioral robustness only) | E4 | Full-text | Behavioral safety; not SC integrity or crypto assurance | N/A |
| Deprecated PQC candidate documentation | E3 | Full-text | Superseded by finalized FIPS standards | S02, S03, S04 |
| NIST IR 8269 (AI Bias Taxonomy) | E4 | Full-text | Algorithmic bias; not SC or crypto assurance | N/A |
| Industry AI model card template (no crypto fields) | E2 | Full-text | Metadata format without integrity or provenance verification | N/A |
| Conference poster on ML model hashing (insufficient detail) | E2 | Full-text | Preliminary results; no extractable specs | N/A |
| Early draft of CycloneDX AI/ML extension | E3 | Full-text | Superseded by CycloneDX v1.5 baseline specification | S46 |
| Vendor whitepaper on AI security (no verifiable methodology) | E1 | Full-text | Marketing-oriented; no reproducible findings | N/A |
| Blog post on quantum computing timelines | E4 | Full-text | QC progress without AI SC or crypto assurance | N/A |
| NIST PQC Round 3 candidate comparison | E3 | Full-text | Superseded by final FIPS 204/205 standards | S03, S04 |
| AI governance checklist (no extractable normative content) | E2 | Full-text | High-level questions without technical specs | N/A |
| Preprint on homomorphic encryption for ML | E4 | Full-text | Computation privacy; not SC integrity or provenance | N/A |
| Workshop proceedings on AI red-teaming (behavioral focus) | E4 | Full-text | Behavioral testing without SC, signing, or provenance | N/A |
| Vendor-specific HSM product brief | E1 | Full-text | Product marketing without independent verification | N/A |
| Unpublished draft on SBOM extensions for ML | E1 | Full-text | No peer review, publication venue, or verifiable authorship | N/A |
| Early IETF PQC cert-profile draft | E3 | Full-text | Superseded by later WG output | S35 |
| News article on SolarWinds attack | E1 | Full-text | Journalistic account; not AI SC specific | N/A |
| Generic zero trust vendor whitepaper | E2 | Full-text | Product claims without AI, PQC, or provenance content | S27 |
| Code | Meaning | Count |
|---|---|---|
| E1 | No verifiable provenance | 4 |
| E2 | No extractable technical or normative content | 5 |
| E3 | Superseded by newer or more authoritative version | 5 |
| E4 | Not transferable to AI SC or crypto assurance | 8 |
| Total | Excluded at full-text review | 22 |
| Stage | Count |
|---|---|
| Records identified | 142 |
| Duplicates removed | 19 |
| Title/abstract screened | 123 |
| Full-text reviewed | 76 |
| Included in final synthesis | 54 |
| Excluded at full text | 22 |
| Excluded at title/abstract | 47 |
Appendix D. Source-to-Proposition and Source-to-Architecture Mapping Summary
| AP | Description | Representative Supporting Sources | Evidence Role |
|---|---|---|---|
| AP1 | AI SC attack surfaces, vulnerabilities, incidents | S12, S13, S14, S15, S16, S17, S18, S19, S25, S26, S37, S38, S47, S48, S49, S50, S51, S52, S53, S54 | Empirical, incident, taxonomy |
| AP2 | PQC transition disrupts long-lived AI artifact verification | S02, S03, S04, S05, S07, S10, S11, S35, S36, S45 | Normative and transition |
| AP3 | Existing frameworks lack complete quantum-resistant provenance | S01, S06, S08, S09, S20, S22, S23, S29, S30, S31, S32, S33, S34, S39, S40, S41, S46 | Governance, control, gap |
| AP4 | Unified architecture required for repeatable assurance | S05, S08, S10, S11, S24, S27, S31, S34, S35, S36, S42, S43, S44, S45 | Architectural, implementation |
| Architectural Output | Description | Primary Supporting S-IDs | Notes |
|---|---|---|---|
| MBOM-PQC schema | Structured provenance model for AI artifacts | S01, S06, S20, S23, S29, S30, S31, S32, S34, S46, S47, S48, S49 | Provenance, identity, integrity metadata |
| PQC-safe signing pipeline | Signing/verification pipeline with PQC-safe signatures | S03, S04, S05, S08, S10, S11, S24, S35, S36, S37, S38, S42, S43, S45 | Signing, verification, attestation, transition |
| Attestation/evidence binding | Binding model, environment, signer, SC evidence | S08, S24, S27, S39, S40, S42, S44, S45, S50, S51 | Trust propagation, deployment assurance |
| SCAMM maturity model | Five-level organizational maturity assessment | S01, S06, S09, S23, S27, S30, S31, S32, S33, S34, S41, S54 | Maturity criteria, organizational assessment |
| Figure/Table | Title/Purpose | Supporting S-IDs |
|---|---|---|
| Figure 1 | Graphical abstract/framework overview | S01, S03, S05, S06, S20, S23, S27, S29, S31, S46, S54 |
| Figure 2 | PRISMA-style flow diagram | S28 |
| Figure 3 | Lifecycle integrity map | S06, S20, S29, S31, S46, S47, S48 |
| Figure 4 | Threat and dependency analysis map | S12–S19, S26, S37, S38 |
| Figure 5 | MBOM-PQC seven-component provenance model | S01, S06, S20, S23, S29, S30, S46, S47, S48, S49 |
| Figure 6 | MBOM-PQC schema for provenance data | S06, S20, S29, S31, S46, S49 |
| Figure 7 | Composite PQC-safe signing pipeline | S03, S04, S05, S10, S11, S35, S36, S37, S38, S43 |
| Figure 8 | AI assurance architecture | S24, S27, S39, S40, S42, S44, S45 |
| Figure 9 | Policy enforcement schema | S08, S24, S27, S31, S39, S40, S42, S50, S51 |
| Figure 10 | Illustrative SCAMM assessment dashboard | S01, S06, S09, S23, S27, S30, S31, S32, S54 |
| Table 1 | Requirements-to-MBOM-PQC traceability matrix | S12–S19, S20, S23, S26 |
| Table 2 | Requirements-to-SCAMM traceability matrix | S02–S05, S08, S10, S11, S24, S35, S36 |
Appendix E. PRISMA 2020 Checklist
| PRISMA Item | # | Checklist Description | Reported In |
|---|---|---|---|
| Title | 1 | Identify report as systematic review | Title page |
| Abstract | 2 | Structured summary | Abstract |
| Rationale | 3 | Describe rationale in context | Section 1 |
| Objectives | 4 | Explicit research questions | Section 3.2 (AP1–AP4) |
| Eligibility criteria | 5 | Inclusion/exclusion criteria | Section 3.4 |
| Information sources | 6 | All info sources with dates | Section 3.3 |
| Search strategy | 7 | Full search strategy | Section 3.3 |
| Selection process | 8 | Process of selecting sources | Section 3.5; Figure 2 |
| Data collection | 9 | Method of data extraction | Section 3.6 |
| Data items | 10 | Variables for extraction | Section 3.6 (nine-field template) |
| Risk of bias | 11 | Methods for assessing bias | Section 3.7 (Tiers A/B/C) |
| Effect measures | 12 | Effect measures used | N/A (qualitative synthesis) |
| Synthesis methods | 13a | Processes to synthesize results | Section 3.1 and Section 3.8 |
| Reporting bias | 13b | Assess reporting biases | Section 3.7 |
| Certainty | 13c | Assess certainty of evidence | Section 3.7 |
| Study selection | 16a | Numbers at each stage | Section 3.5: 142→19→123→76→54 |
| Flow diagram | 16b | PRISMA flow diagram | Figure 2 |
| Characteristics | 18 | Characteristics of included sources | Appendix A |
| Risk in studies | 19 | Risk of bias per study | Appendix B (tier column) |
| Syntheses | 20a | Summary of results | Section 4, Section 5, Section 6 and Section 7 (Results) |
| Certainty | 22 | Certainty assessment per outcome | Section 3.7; Appendix F |
| Interpretation | 23a | General interpretation | Section 8 (Discussion) |
| Limitations | 23b | Limitations of evidence/review | Section 8.4 and Section 8.5 |
| Registration | 24a | Registration info | Not registered |
| Protocol | 24b | Protocol access | Supplementary Materials |
| Amendments | 24c | Amendments to protocol | Section 3.3: IETF drafts updated |
| Funding | 25 | Financial support | Front matter: no external funding |
| Competing interests | 26 | Declare conflicts | Front matter: no conflicts |
Appendix F. Confidence-Tier Assignment Summary
References
- NIST. Artificial Intelligence Risk Management Framework (AI RMF 1.0); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2023.
- NIST. ML-DSA: Module-Lattice-Based Digital Signature Algorithm; FIPS 204; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
- NIST. SLH-DSA: Stateless Hash-Based Digital Signature Algorithm; FIPS 205; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
- ReversingLabs. Malicious Machine Learning Packages Targeting ML Developers in PyPI; ReversingLabs Threat Research: Boston, MA, USA, 2023. [Google Scholar]
- CISA. Software Supply Chain Attacks: Threat Landscape and Mitigations; Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2023.
- MITRE. ATLAS: Adversarial Threat Landscape for Artificial-Intelligence Systems; The MITRE Corporation: McLean, VA, USA, 2024; Available online: https://atlas.mitre.org (accessed on 15 January 2026).
- OWASP. Machine Learning Security Top 10: ML06—AI Supply Chain Attacks; OWASP Foundation. 2023. Available online: https://owasp.org/www-project-machine-learning-security-top-10/ (accessed on 15 January 2026).
- OWASP. Top 10 for Large Language Model Applications, Version 2025: LLM03—Supply Chain; OWASP GenAI Security Project. 2025. Available online: https://genai.owasp.org/ (accessed on 15 January 2026).
- ISO/IEC 42001:2023; Information Technology—Artificial Intelligence—Management System. International Organization for Standardization: Geneva, Switzerland, 2023.
- NIST. Secure Software Development Framework (SSDF), Version 1.1; SP 800-218; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022.
- NSA. Commercial National Security Algorithm Suite 2.0 (CNSA 2.0); National Security Agency: Fort Meade, MD, USA, 2022.
- OMB. Memorandum M-23-02: Migrating to Post-Quantum Cryptography; Implements National Security Memorandum 10 (NSM-10); Office of Management and Budget: Washington, DC, USA, 2022.
- Carlini, N.; Jagielski, M.; Choquette-Choo, C.A.; Paleka, D.; Pearce, W.; Anderson, H.; Terzis, A.; Thomas, K.; Tramèr, F. Poisoning Web-Scale Training Datasets is Practical. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP); IEEE: San Francisco, CA, USA, 2024; pp. 407–425. [Google Scholar] [CrossRef]
- Goldblum, M.; Tsipras, D.; Xie, C.; Chen, X.; Schwarzschild, A.; Song, D.; Mądry, A.; Li, B.; Goldstein, T. Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 45, 1563–1580. [Google Scholar] [CrossRef] [PubMed]
- Jiang, W.; Synovic, N.; Hyatt, M.; Schorlemmer, T.R.; Sethi, R.; Lu, Y.-H.; Thiruvathukal, G.K.; Davis, J.C. An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry. In Proceedings of the 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE); IEEE: Melbourne, Australia, 2023; pp. 2463–2475. [Google Scholar] [CrossRef]
- PyTorch. TorchServe Security Advisory: Server-Side Request Forgery and Model Loading Vulnerabilities (CVE-2023-43654); PyTorch Foundation: San Francisco, CA, USA, 2023. Available online: https://nvd.nist.gov/vuln/detail/CVE-2023-43654 (accessed on 15 January 2026).
- Ladisa, P.; Plate, H.; Martinez, M.; Barais, O. SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP); IEEE: San Francisco, CA, USA, 2023; pp. 1509–1526. [Google Scholar] [CrossRef]
- Li, Y.; Wang, H.; Barni, M. A Survey of Deep Neural Network Watermarking Techniques. Neurocomputing 2021, 461, 171–193. [Google Scholar] [CrossRef]
- Zhao, J.; Wang, S.; Zhao, Y.; Hou, X.; Wang, K.; Gao, P.; Zhang, Y.; Wei, C.; Wang, H. Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024); ACM: Sacramento, CA, USA, 2024. [Google Scholar] [CrossRef]
- Rieger, P.; Krauß, T.; Miettinen, M.; Dmitrienko, A.; Sadeghi, A.-R. CrowdGuard: Federated Backdoor Detection in Federated Learning. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2024); Internet Society: San Diego, CA, USA, 2024. [Google Scholar] [CrossRef]
- Bai, S.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation (Version 3.1); NIST Post-Quantum Cryptography Standardization Round 3 Submission. 8 February 2021. Available online: https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf (accessed on 26 April 2026).
- NIST. ML-KEM: Module-Lattice-Based Key-Encapsulation Mechanism; FIPS 203; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
- NIST. Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations; SP 800-161r1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022; (updated 2024). [CrossRef]
- NIST. The NIST Cybersecurity Framework (CSF) 2.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
- NIST. SP 800-204D: Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
- DoD CDAO. Responsible Artificial Intelligence (RAI) Toolkit; Chief Digital and Artificial Intelligence Office: Arlington, VA, USA, 2024; Available online: https://www.ai.mil/Latest/Blog/Article-Display/Article/3940314/responsible-ai-toolkit/ (accessed on 15 January 2026).
- NIST. SP 800-208: Recommendation for Stateful Hash-Based Signature Schemes (XMSS and LMS); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020.
- Hevner, A.R.; March, S.T.; Park, J.; Ram, S. Design Science in Information Systems Research. MIS Q. 2004, 28, 75–105. [Google Scholar] [CrossRef]
- Peffers, K.; Tuunanen, T.; Rothenberger, M.A.; Chatterjee, S. A Design Science Research Methodology for Information Systems Research. J. Manag. Inf. Syst. 2007, 24, 45–77. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef] [PubMed]
- IETF. Hybrid Key Exchange in TLS 1.3; Internet-Draft draft-ietf-tls-hybrid-design-16; Internet Engineering Task Force, 2026. (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/ (accessed on 15 January 2026).
- IETF. Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3; Internet-Draft draft-ietf-tls-ecdhe-mlkem-04; Internet Engineering Task Force, 2026. (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/ (accessed on 15 January 2026).
- NIST. Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile; SP 800-218A; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024. Available online: https://csrc.nist.gov/pubs/sp/800/218/a/final (accessed on 15 January 2026).
- NIST. Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile; AI 600-1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
- NIST. Security and Privacy Controls for Information Systems and Organizations; SP 800-53, Rev. 5; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [CrossRef]
- ISO/IEC 23894:2023; Information Technology—Artificial Intelligence—Guidance on Risk Management. International Organization for Standardization: Geneva, Switzerland, 2023.
- CISA. Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default; Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2023. Available online: https://www.cisa.gov/securebydesign (accessed on 15 January 2026).
- DoD. Data, Analytics, and Artificial Intelligence Adoption Strategy; Department of Defense: Washington, DC, USA, 2023.
- OWASP Foundation; Ecma TC54. CycloneDX Bill of Materials Standard (ECMA-424). 2023. Available online: https://cyclonedx.org/specification/overview/ (accessed on 15 January 2026).
- Li, Y.; Lyu, X.; Koren, N.; Lyu, L.; Li, B.; Ma, X. Anti-Backdoor Learning: Training Clean Models on Poisoned Data. In Proceedings of the 35th Conference on Neural Information Processing Systems (NeurIPS 2021); Curran Associates: Red Hook, NY, USA, 2021; pp. 14900–14912. [Google Scholar]
- Trusted Computing Group. PC Client Platform TPM Profile (PTP) Specification, Family 2.0; Level 00, 2025 draft revision; Trusted Computing Group: Beaverton, OR, USA, 2025; Available online: https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/ (accessed on 26 April 2026).
- GSA. Post-Quantum Cryptography Buyer’s Guide; U.S. General Services Administration: Washington, DC, USA, 2025. Available online: https://buy.gsa.gov/api/system/files/documents/final-508c-pqc_buyer-s_guide_2025.pdf (accessed on 26 April 2026).
- CISA. Product Categories for Technologies That Use Post-Quantum Cryptography Standards; published per Executive Order 14306; Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2026. Available online: https://www.cisa.gov/resources-tools/resources/product-categories-technologies-use-post-quantum-cryptography-standards (accessed on 26 April 2026).
- NIST. Zero Trust Architecture; SP 800-207; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020.
- IETF. Internet X.509 Public Key Infrastructure—Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA); RFC 9881; Internet Engineering Task Force, 2025. Available online: https://www.rfc-editor.org/rfc/rfc9881 (accessed on 15 January 2026).
- The White House. Executive Order 14110: Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence; National Archives and Records Administration: Washington, DC, USA, 2023.
- NSA; CISA. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems; National Security Agency and Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2024. Available online: https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF (accessed on 15 January 2026).
- Gu, T.; Dolan-Gavitt, B.; Garg, S. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. IEEE Access 2019, 7, 47230–47244. [Google Scholar] [CrossRef]
- Ohm, M.; Plate, H.; Sykosch, A.; Meier, M. Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020); Maurice, C., Bilge, L., Stringhini, G., Neves, N., Eds.; Lecture Notes in Computer Science 12223; Springer: Cham, Switzerland, 2020; pp. 23–43. [Google Scholar] [CrossRef]
- PyTorch Foundation. Compromised PyTorch-Nightly Dependency Chain Between December 25th and December 30th, 2022; PyTorch Blog. December 2022. Available online: https://pytorch.org/blog/compromised-nightly-dependency/ (accessed on 15 January 2026).
- Hugging Face. Hub Security Documentation: Pickle Scanning, Malware Scanning, and Repository Trust Controls. 2024. Available online: https://huggingface.co/docs/hub/en/security (accessed on 15 January 2026).
- Ultralytics. GitHub Issue #18027: Published Wheel 8.3.41 Contained Code Not Present in GitHub and Appeared to Invoke an XMRig Miner. December 2024. Available online: https://github.com/ultralytics/ultralytics/issues/18027 (accessed on 15 January 2026).
- IETF. Composite ML-DSA for Use in X.509 Public Key Infrastructure; Internet-Draft, Current IETF LAMPS Working-Group Draft. (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-lamps-pq-composite-sigs/ (accessed on 15 January 2026).
- Kumar, R.S.S.; O’Brien, D.; Albert, K.; Viljoen, S.; Snover, J. Failure Modes in Machine Learning; Microsoft Corporation: Redmond, WA, USA, 2019; Available online: https://learn.microsoft.com/en-us/security/engineering/failure-modes-in-machine-learning (accessed on 15 January 2026).
- Google. Secure AI Framework (SAIF); Google LLC: Mountain View, CA, USA, 2023; Available online: https://safety.google/cybersecurity-advancements/saif/ (accessed on 15 January 2026).
- Red Hat. Trusted Software Supply Chain: Platform Resiliency for AI Workloads; Red Hat: Raleigh, NC, USA, 2024; Available online: https://www.redhat.com/en/solutions/trusted-software-supply-chain (accessed on 15 January 2026).
- Machado, G.R.; Silva, E.; Goldschmidt, R.R. Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective. ACM Comput. Surv. 2023, 55, 1–38. [Google Scholar] [CrossRef]
- Wu, B.; Chen, H.; Zhang, M.; Zhu, Z.; Wei, S.; Yuan, D.; Shen, C. BackdoorBench: A Comprehensive Benchmark of Backdoor Learning. In Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS 2022) Datasets and Benchmarks Track; Curran Associates: Red Hook, NY, USA, 2022. [Google Scholar]
- Open Container Initiative. Image Format Specification, Version 1.1.0; OCI Working Group: San Francisco, CA, USA, 2024. Available online: https://github.com/opencontainers/image-spec (accessed on 15 January 2026).
- NIST. A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments; SP 800-207A; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2023.









| Dimension | SPDX 3.0 | CycloneDX 1.6 | NIST SSDF | NIST AI RMF | NIST CSF 2.0 | OWASP ML | OWASP GenAI | MBOM-PQC |
|---|---|---|---|---|---|---|---|---|
| Model metadata (architecture, version) | ◐ | ◐ | ○ | ○ | ○ | ○ | ◐ | ● |
| Pre-training dataset lineage | ○ | ○ | ○ | ◐ | ○ | ◐ | ◐ | ● |
| Fine-tuning artifacts | ○ | ○ | ○ | ◐ | ○ | ◐ | ◐ | ● |
| Pre-trained model dependencies (CVE links) | ◐ | ● | ● | ○ | ◐ | ◐ | ◐ | ● |
| Training environment attestation | ○ | ○ | ◐ | ○ | ◐ | ○ | ○ | ● |
| Deployment packaging dependency graph | ● | ● | ◐ | ○ | ◐ | ○ | ◐ | ● |
| Cryptographic integrity fields | ◐ | ◐ | ◐ | ○ | ◐ | ○ | ○ | ● |
| PQC-safe signing (FIPS 204/205) | ○ | ○ | ○ | ○ | ○ | ○ | ○ | ● |
| Hybrid signature mode support | ○ | ○ | ○ | ○ | ○ | ○ | ○ | ● |
| Lifecycle stage attestation | ○ | ○ | ◐ | ○ | ◐ | ○ | ○ | ● |
| Organizational maturity model | ○ | ○ | ○ | ◐ | ● | ○ | ○ | ● |
| Governance/policy mapping | ○ | ○ | ◐ | ● | ● | ◐ | ◐ | ● |
| Database | Query String | Date Executed | Hits | After Dedup |
|---|---|---|---|---|
| IEEE Xplore | (“AI supply chain” OR “machine learning supply chain”) AND (“provenance” OR “attestation” OR “signing”) | 14 January 2025; rerun 12 March 2026 | 47 | 40 |
| ACM Digital Library | (“model signing” OR “model provenance”) AND (“integrity” OR “adversarial”) | 14 January 2025; rerun 12 March 2026 | 31 | 24 |
| IACR ePrint | “post-quantum” AND (“signature size” OR “hybrid signature” OR “ML-DSA” OR “SLH-DSA”) | 16 January 2025; rerun 12 March 2026 | 22 | 19 |
| NIST CSRC | “AI” OR “post-quantum” filtered to FIPS, SP 800 series, AI 600 series | 16 January 2025; rerun 12 March 2026 | 14 | 14 |
| NSA.gov | “CNSA 2.0” OR “quantum-resistant” filtered to advisory and CSI publications | 12 January 2025; rerun 13 March 2026 | 6 | 6 |
| CISA.gov | “AI” AND (“supply chain” OR “secure by design”) | 17 January 2025; rerun 13 March 2026 | 11 | 9 |
| Curated incident repositories (PyTorch advisories, ReversingLabs, Hugging Face Hub, Ultralytics tracker) | manual curation by date filter 2020–2026 | 18–20 January 2025; rerun 14 March 2026 | 11 | 11 |
| Total before screening | 142 | 123 |
| Threat Source | Requirement | MBOM-PQC Schema Component |
|---|---|---|
| Training-time attacks (§4.1.1) | Dataset poisoning detection | C2: Pre-Training Dataset Lineage |
| Ingestion-time attacks (§4.1.2) | Model swap prevention | C3: Pre-Trained Model Dependencies |
| Training-time and ingestion-time threats (§4.1.1, §4.1.2) | Fine-tuning tampering detection | C4: Fine-Tuning Artifacts |
| Pipeline compromise (§4.2.3) | Pipeline integrity | C5: Training Environment & Pipeline |
| Quantum-enabled forgery (§4.2.1) | PQC-safe integrity | C7: Cryptographic Integrity Fields |
| Multi-stage supply chain (§4.3) | Lifecycle transparency | All components (C1–C7) |
| Profile | Operational Signing | Long-Term Archival | Hash | Use Context |
|---|---|---|---|---|
| Constrained/Internal | ML-DSA-44 (NIST L2) | — | SHA-3-256 or SHAKE-256 | Internal-only artifacts; short-lived non-regulated commercial settings |
| Civilian/Commercial (default) | ML-DSA-65 (NIST L3) | SLH-DSA-128s (NIST L1) | SHA-3-256 or SHAKE-256 | Federal non-NSS; regulated industries (healthcare, finance); critical infrastructure where signature-size budget permits L3 |
| High-Assurance/non-NSS | ML-DSA-87 (NIST L5) | SLH-DSA-256s (NIST L5) | SHA-3-512 or SHAKE-256 | Highest-assurance non-NSS deployments; regulated industries and critical infrastructure requiring NIST Level 5 strength; SLH-DSA-256s suitable for long-term archival where hash-based forward security is desirable |
| NSS/CNSA 2.0 | ML-DSA-87 (NIST L5) | ML-DSA-87 (NIST L5) | SHA-3-512 or SHAKE-256 | National Security Systems; classified workloads; CNSA 2.0–mandated procurement (ML-DSA-87/Category 5 [11]); FIPS 205/SLH-DSA is not approved for NSS, so ML-DSA-87 covers both operational signing and archival integrity (re-signed at policy cadence) |
| # | Requirement | Threat/Dependency | Evidence (Tier) | Operationalization | SCAMM Indicator |
|---|---|---|---|---|---|
| 1 | Pre-training dataset lineage capture | Training-time data poisoning (§4.1.1) | [13] T3, [14] T3 | Schema C2 | i_{prov,2} |
| 2 | Pre-trained model dependency tracking | Ingestion-time tampering (§4.1.2) | [4] T4, [16] T4, [19] T3 | Schema C3 | i_{prov,3} |
| 3 | Fine-tuning artifact provenance | Fine-tuning tampering (§4.3.2) | [14] T3, [57] T3 | Schema C4 | i_{prov,4} |
| 4 | Training environment attestation | Pipeline compromise (§4.2.3) | [44] T1, [47] T2 | Schema C5; Pipeline Stage 4 | i_{attest,2} |
| 5 | Deployment packaging integrity | Deployment-time tampering (§4.1.3) | [10] T1, [47] T2 | Schema C6; Pipeline Stage 5 | i_{prov,5} |
| 6 | PQC-safe signing of artifacts | Quantum-enabled forgery, HNFL (§1, §4.2.1) | [2] T1, [11] T2 | Schema C7; Pipeline Stage 3 | i_{crypto,1} |
| 7 | Hybrid signature support during transition | Backward verifier compatibility (§5.3.1) | [31] T5, [32] T5, [53] T5 | Schema C7; Pipeline Stage 3 | i_{crypto,2} |
| 8 | Certificate-chain PQC-safe validation | Long-term chain integrity (§5.3.2) | [45] T1 | Schema C7; Pipeline Stage 2 | i_{crypto,3} |
| 9 | Lifecycle attestation cadence | Multi-stage compromise (§4.3) | [44] T1, [47] T2 | Pipeline Stages 1–5 | i_{attest,3} |
| 10 | Continuous verification | Continuous-learning integrity (§4.3.4, §6.5) | [44] T1 | Pipeline Stage 5; §6.5 | i_{attest,3} |
| 11 | Audit trail and policy enforcement | Governance gap (§4.4.4) | [1] T1, [23] T1, [46] T2 | §6.4 | i_{gov,1} |
| 12 | Risk analysis and mitigation cadence | Operational risk drift (§4.3.4) | [23] T1, [24] T1 | Discussion §8 | i_{gov,2,3} |
| 13 | Zero Trust controls alignment | Trust scoring (§6.4, §8.2) | [44] T1, [60] T1 | §6.4 | i_{gov,4} |
| Model Class | Artifact Size | Bundle Overhead | Relative Overhead | SHA-3-256 Hash Time (sw/hw) | ML-DSA-65 Verify [21] | Cryptographic-Core Verify (sw/hw) |
|---|---|---|---|---|---|---|
| Small Transformer (BERT-base) | 50 MB | 11.8 KB | 0.023% | 100 ms/10 ms | 54 μs | ≈100 ms/≈10 ms |
| Mid-tier classifier | 500 MB | 11.8 KB | 0.0023% | 1.0 s/100 ms | 54 μs | ≈1.0 s/≈100 ms |
| 7B-parameter LLM (FP16) | 14 GB | 11.8 KB | 8.0 × 10−5% | 28 s/2.8 s | 54 μs | ≈28 s/≈2.8 s |
| 70B-parameter LLM (FP16) | 140 GB | 11.8 KB | 8.0 × 10−6% | 280 s/28 s | 54 μs | ≈280 s/≈28 s |
| Frontier checkpoint (FP16) | 350 GB | 11.8 KB | 3.2 × 10−6% | 700 s/70 s | 54 μs | ≈700 s/≈70 s |
| Strategy | Capital Expenditure | Operational Expenditure | Timeline to Deploy | PQC Durability | Hardware-Rooted Assurance |
|---|---|---|---|---|---|
| Software-rooted attestation | ○ | ○ | Short | Full | Reduced (software keys) |
| Hybrid-bundle bridging | ○ | ◐ | Short | Full (classical leg compromisable post-Q) | Preserved (classical leg only) |
| Phased hardware refresh | ● | ○ | Long | Full | Full |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Campbell, R. AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance. Systems 2026, 14, 593. https://doi.org/10.3390/systems14050593
Campbell R. AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance. Systems. 2026; 14(5):593. https://doi.org/10.3390/systems14050593
Chicago/Turabian StyleCampbell, Robert. 2026. "AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance" Systems 14, no. 5: 593. https://doi.org/10.3390/systems14050593
APA StyleCampbell, R. (2026). AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance. Systems, 14(5), 593. https://doi.org/10.3390/systems14050593

