Previous Article in Journal
When Values Meet Work: Corporate Social Responsibility and Employment Decisions in Contemporary Labor Markets
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Hypothesis

AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance

Independent Researcher, Upper Marlboro, MD 20774, USA
Systems 2026, 14(5), 593; https://doi.org/10.3390/systems14050593
Submission received: 23 March 2026 / Revised: 13 May 2026 / Accepted: 18 May 2026 / Published: 21 May 2026

Abstract

Artificial intelligence (AI) systems increasingly depend on complex, multi-stage supply chains that incorporate pre-trained models, third-party datasets, open-source libraries, and automated training pipelines. This dependency creates a rapidly expanding attack surface in which model poisoning, dependency compromise, and provenance manipulation can undermine system integrity long before deployment. Existing AI governance frameworks—including the NIST AI Risk Management Framework and NIST’s Secure Software Development Framework—acknowledge supply chain risks but do not define a verifiable model provenance structure or cryptographically durable integrity guarantees. Simultaneously, the transition to post-quantum cryptography (PQC) introduces new requirements for long-lived AI artifacts: classical digital signatures used to verify model lineage, dataset integrity, and pipeline attestation will become vulnerable to quantum-enabled forgery within the expected operational lifetime of many AI systems. This paper synthesizes evidence from policy, standards, and benchmark sources to characterize the emerging AI supply chain threat landscape and identify cryptographic dependencies that the PQC transition disrupts. We propose a formal Model Bill of Materials with PQC-safe extensions (MBOM-PQC), a unified signing and attestation pipeline integrating ML-DSA and hybrid signature modes, and a five-level Supply Chain Assurance Maturity Model (SCAMM) supporting repeatable organizational evaluation. Together, these contributions aim to provide a structured foundation for AI supply chain integrity, supporting verifiable model lineage, authenticity, and trustworthiness through the PQC transition and beyond. The framework is presented as a design-science contribution comprising three integrated artifacts and is extended with operational guidance for continuous-learning pipelines (§6.5), a formal scoring methodology for organizational assessment (§7.3.5), and a hardware-root-of-trust migration cost matrix (§8.3.6).

1. Introduction

Artificial intelligence (AI) systems increasingly rely on complex, multi-stage supply chains that integrate pre-trained models, third-party datasets, open-source libraries, cloud-hosted training pipelines, and automated deployment workflows. While this modularity accelerates capability development, it also introduces opaque dependencies and systemic vulnerabilities. Compromise at any point in the supply chain—whether through poisoned training data, tampered model weights, malicious dependencies, or manipulated provenance metadata—can undermine the integrity of downstream AI systems long before they reach operational environments.
Five terms recur throughout this manuscript and warrant explicit definition for readers approaching from adjacent disciplines. An AI supply chain refers to the full set of artifacts and processes that influence model behavior—pre-trained foundation models, datasets used for pre-training and fine-tuning, open-source libraries, training infrastructure, and deployment pipelines—together with the entities that produce, transform, distribute, and consume these artifacts (consistent with NIST AI RMF [1] usage). Model provenance denotes the verifiable lineage of an AI artifact, capturing who produced it, from what inputs, in what environment, and through what transformations. Post-quantum cryptography (PQC) refers to cryptographic primitives believed to remain secure against adversaries equipped with cryptographically relevant quantum computers; the present manuscript focuses on the digital-signature subset standardized by NIST as FIPS 204 (ML-DSA) [2] and FIPS 205 (SLH-DSA) [3]. Cryptographic agility is the architectural property of being able to substitute one cryptographic primitive for another without redesigning the surrounding system, enabling phased migration as standards evolve. A hybrid signature mode binds a classical signature (typically ECDSA or Ed25519) and a post-quantum signature (typically ML-DSA) over the same payload, so that a verifier requires both signatures to be valid; this construction provides backward compatibility with classical-only verifiers while ensuring that compromise of either algorithm alone does not invalidate the integrity guarantee.
Documented incidents involving compromised machine learning libraries, malicious PyPI packages, and insecure model-serving or distribution pathways indicate that AI supply chain attacks are no longer theoretical; they represent a growing class of adversarial activity targeting both commercial and government systems [4,5]. The MITRE ATLAS knowledge base further systematizes these attack patterns by cataloging adversarial tactics and techniques relevant to AI-enabled systems [6]. The same supply chain risk surface extends into consumer-deployed AI—voice assistants, mobile inference, on-device personalization—where compromise of the model distribution path or its dependencies can affect end-user trust at scale (the OWASP ML Top 10 [7], OWASP GenAI LLM Top 10 [8], and ISO/IEC 42001:2023 [9] each address consumer-facing dimensions of this risk surface from complementary angles).
Despite this expanding threat landscape, existing AI governance frameworks provide limited guidance on verifiable model provenance or cryptographically durable integrity guarantees. The NIST AI Risk Management Framework emphasizes governance, transparency, and robustness [1] but does not define a standardized structure for documenting model lineage or verifying the authenticity of training artifacts. NIST’s Secure Software Development Framework addresses software supply chain risks [10] but does not extend its requirements to AI-specific artifacts such as model checkpoints, fine-tuning datasets, or hyperparameter configurations. Similarly, emerging model evaluation and red-teaming guidance focuses on behavioral robustness rather than supply chain integrity. As a result, organizations lack a unified method for establishing trust in the origin, composition, and integrity of the AI components they deploy.
AI artifacts and the records that attest to their integrity often have operational lifetimes measured in years. Foundation models deployed in defense, healthcare, transportation, and critical infrastructure may remain in service well beyond the anticipated arrival of cryptographically relevant quantum computers. The cryptographic confidentiality analogue of this temporal mismatch—the harvest-now, decrypt-later (HNDL) pattern, in which adversaries capture encrypted traffic today for future decryption once quantum capability matures—is well documented in the published literature on quantum-safe transition timelines and is the basis for normative guidance such as NSA CNSA 2.0 [11] and OMB M-23-02 [12]. The same temporal logic, applied to digital signatures rather than to encryption, has received less explicit treatment in the AI assurance literature.
This manuscript introduces and uses the term harvest-now, forge-later (HNFL) to name a previously under-articulated threat class for AI artifacts. HNFL is the author’s proposed framing extension of the established HNDL pattern to AI-artifact signature integrity; it is a contribution of this manuscript and not a term received from the cited literature on PQC migration or AI supply chain security. The HNFL pattern refers to adversaries collecting signed AI artifacts under current classical signature regimes for later forgery of counterfeit signatures, or for substitution of counterfeit artifacts under reused signing keys, once cryptographically relevant quantum computers become available; this threat is implicit in the cryptographic transition timelines documented by NSA CNSA 2.0 [11] and OMB M-23-02 [12]. However, those documents address the post-quantum transition principally in confidentiality terms, where HNDL is the established pattern, rather than in signature integrity terms. The HNFL framing is used in the remainder of the paper to motivate the requirement that signing pipelines for AI artifacts be PQC-safe by the end of the operational lifetime of the artifacts they attest, not merely by the end of the lifetime of the immediate signing operation. The framing claim itself—that AI signature integrity is subject to a harvest-now, forge-later temporal mismatch analogous to but distinct from HNDL—is offered as a contribution of this manuscript alongside the three architectural artifacts presented in Section 5, Section 6 and Section 7.
The absence of a standardized, cryptographically resilient provenance model creates operational challenges for organizations deploying AI systems in high-assurance environments. Without verifiable lineage, authorizing officials cannot reliably assess whether a model has been tampered with, whether training data originated from trusted sources, or whether dependencies were validated using PQC-safe mechanisms. Program managers lack a structured method for evaluating supply chain risk across heterogeneous AI pipelines. Enterprise architects face difficulty integrating AI assurance into broader modernization efforts such as Zero Trust Architecture (ZTA) and PQC migration. These challenges mirror broader patterns observed in cybersecurity modernization: independently justified initiatives create cross-program dependencies that become visible only during implementation.
This paper addresses these gaps by proposing a formal, cryptographically anchored framework for AI supply chain security. Through systematic evidence synthesis of policy documents, standards publications, and documented supply chain incidents, we identify the structural weaknesses that undermine current AI provenance practices and the cryptographic dependencies that PQC transition disrupts. Building on this analysis, we introduce three prescriptive contributions: (1) a Model Bill of Materials with PQC-safe extensions (MBOM-PQC) that defines a verifiable provenance schema for AI artifacts; (2) a unified model signing and attestation pipeline that integrates ML-DSA, hybrid signature modes, and PQC-ready certificate-chain design; and (3) a five-level Supply Chain Assurance Maturity Model (SCAMM) that enables repeatable organizational assessment and roadmap development. Together, these components aim to support a structured foundation for AI supply chain integrity, with the goal that model lineage, authenticity, and trustworthiness remain verifiable throughout the PQC transition and beyond.
The remainder of this manuscript pursues three explicit design objectives. DO1. Define a verifiable provenance structure for AI artifacts that captures the lineage and integrity-relevant properties needed for downstream assurance. DO2. Integrate PQC-safe signing and attestation into AI supply chain pipelines in a manner that supports hybrid transition rather than presupposing fully post-quantum-capable infrastructure. DO3. Provide a maturity model that enables organizational self-assessment against DO1 and DO2 and that aligns with established cybersecurity modernization frameworks. Each objective is operationalized by one of the three principal artifacts presented in Section 5 and Section 6, and Section 7 respectively, and each is revisited in Section 8 with explicit identification of validation criteria deferred to future work.

2. Background and Related Work

AI supply chain security has emerged as a critical concern, as organizations increasingly rely on externally sourced models, datasets, and machine learning components. Unlike traditional software supply chains—where source code, binaries, and dependencies can be tracked through established mechanisms such as software bills of materials (SBOMs)—AI supply chains involve artifacts that lack standardized provenance structures, cryptographic protections, or lifecycle visibility. This section reviews the foundational elements of AI supply chain risk, the cryptographic underpinnings of AI assurance, the implications of post-quantum cryptography (PQC) transition, and the limitations of existing frameworks.

2.1. AI Supply Chain Risks

Modern AI systems are rarely built from scratch. Instead, they incorporate pre-trained foundation models, fine-tuning datasets, open-source libraries, and automated training pipelines. Each component introduces potential attack vectors. The peer-reviewed literature on adversarial machine learning has documented training-time attacks across this surface in considerable detail, with Carlini et al. demonstrating the poisoning of training-data sources [13], Goldblum et al. providing a systematic survey of model-poisoning techniques [14], and Jiang et al. empirically studying pre-trained model reuse practices and supply chain risks in the Hugging Face ecosystem [15]. Training-time attacks—including data poisoning, model poisoning, and backdoor insertion—can compromise model behavior before deployment. Model ingestion attacks, where adversaries tamper with pre-trained models hosted on public repositories, can introduce malicious behaviors that propagate downstream; this pattern has been documented empirically in the PyTorch CVE-2023-43654 advisory [16] and the broader open-source software supply chain attack taxonomy applicable to ML packaging by Ladisa et al. [17]. Dependency compromise—such as malicious PyPI or NPM packages embedded in ML workflows—can alter training logic or exfiltrate sensitive data. Artifact replacement and tampering during distribution or deployment, in which a legitimate model is substituted with a manipulated version, undermine trust in the entire pipeline [4]. These risks are amplified by the opacity of AI artifacts. Unlike source code, model weights and training datasets are difficult to inspect, so tampering is hard to detect without cryptographic verification or provenance metadata. The MITRE ATLAS framework catalogs these and related adversarial techniques across the AI lifecycle [6]; consequently, AI supply chain compromise can remain undetected until operational failures occur.

2.2. Cryptographic Foundations of AI Assurance

Cryptography plays a central role in establishing trust in AI systems. The peer-reviewed literature on model provenance and signed-artifact integrity provides the foundational treatment: Li et al. surveyed deep neural network watermarking— an adjacent integrity primitive that embeds hidden markers in model weights rather than producing signed attestations over them—[18], and Zhao et al. characterized malicious-code poisoning patterns affecting pre-trained model hubs [19]. Within this academic framing, digital signing mechanisms are used to verify the authenticity and integrity of model artifacts, providing a cryptographic basis for detecting tampering and confirming provenance. Dataset integrity verification supports the assurance that training data has not been altered or poisoned. Secure enclaves and confidential computing protect model execution environments; federated-learning authentication ensures that model updates originate from trusted participants, with complementary adversarial-defense analyses for federated-learning model updates provided by Rieger et al. [20]. Pipeline attestation verifies that training and deployment workflows executed in approved environments. These mechanisms rely heavily on digital signatures, certificate chains, and secure key management—most current implementations of which use classical algorithms (RSA, ECDSA, Ed25519) that are vulnerable to quantum-enabled attacks. As AI systems become more deeply integrated into mission-critical and long-lived applications, the durability of these cryptographic assurances becomes a central concern.

2.3. Post-Quantum Cryptography Transition Requirements

The transition to PQC introduces new constraints for AI assurance. The performance characteristics of the lattice-based and hash-based PQC signature schemes have been characterized in detail in the peer-reviewed cryptographic literature: the original CRYSTALS-Dilithium specification by Bai, Ducas, Kiltz, Lepoint, Lyubashevsky, Schwabe, Seiler, and Stehlé [21] provides the algorithm parameters, security analysis, and reference benchmarks that NIST FIPS 204 [2] now standardizes; the SPHINCS+ family that became FIPS 205 [3] is similarly grounded in published cryptographic analysis. Within this standards framing, NIST’s standardization of ML-KEM (FIPS 203) [22] for key establishment and ML-DSA (FIPS 204) [2] and SLH-DSA (FIPS 205) [3] for digital signatures fundamentally changes the cryptographic landscape. PQC algorithms have significantly larger key and signature sizes than their classical counterparts. The increase affects model signing workflows, certificate chains, secure enclaves, federated learning protocols, and long-lived artifacts such as model checkpoints and provenance records. NSA CNSA 2.0 [11] establishes a quantum-resistant signature direction for National Security Systems aligned with ML-DSA. The guidance emphasizes that classical signatures are not designed to provide long-term integrity protection. SLH-DSA, while not included in CNSA 2.0, is approved by NIST for federal and commercial use outside NSS and offers conservative hash-based security for long-lived archival artifacts. AI artifacts—especially models used in defense, healthcare, transportation, and critical infrastructure—often have operational lifetimes extending beyond the expected arrival of cryptographically relevant quantum computers. This creates a need for PQC-safe signing and hybrid signature modes in AI supply chains, supporting continued validity of integrity guarantees through the post-quantum transition.

2.4. Gaps in Existing Frameworks

Several frameworks address aspects of AI governance, software supply chain security, or cryptographic transition, but none provide a unified approach to AI supply chain integrity. The NIST AI Risk Management Framework (AI RMF) [1] provides governance and risk categories but does not define a model provenance structure or cryptographic requirements. NIST’s Secure Software Development Framework (SSDF) [10] addresses software supply chain risks but does not extend to AI-specific artifacts such as model weights or training datasets. NIST Cybersecurity Supply Chain Risk Management practices (SP 800-161r1) [23] specify third-party and vendor risk management for federal systems but predate the AI-specific provenance and lineage challenges this work addresses. The NIST Cybersecurity Framework (CSF 2.0) [24] provides a five-function (Identify, Protect, Detect, Respond, Recover) governance backbone applicable to AI systems but does not specify model-artifact provenance structures or PQC-safe attestation requirements. NIST SP 800-204D [25] provides guidance for integrating software supply chain security controls into DevSecOps CI/CD pipelines, but it does not define AI-specific provenance structures or model assurance mechanisms. The DoD CDAO Responsible AI Toolkit [26] focuses on ethical and operational considerations rather than cryptographic integrity. Established SBOM standards—including SPDX and CycloneDX—do not capture AI-specific metadata such as dataset lineage, hyperparameters, or training environment details. PQC transition guidance, including NIST SP 800-208 [27] and CNSA 2.0 [11], does not address AI artifacts or model provenance. The absence of an established Model Bill of Materials (MBOM) standard combines with the absence of PQC-safe signing and attestation pipelines. Together, these gaps leave organizations without a structured method for verifying the authenticity, lineage, and integrity of AI systems. This gap motivates the proposed formal, cryptographically anchored framework that integrates provenance, PQC-safe signatures, and supply chain assurance.
To make the gap analysis more substantive than the rhetorical claim that adjacent frameworks are insufficient, Table 1 places MBOM-PQC field-by-field alongside seven authoritative comparators along twelve provenance and assurance dimensions. The table is referenced again from the introductions to Section 5, Section 6 and Section 7.
The pattern shown by Table 1 is that the adjacent frameworks each cover a distinct slice of the requirement space—SPDX/CycloneDX for software-artifact dependencies, SSDF for development-process controls, AI RMF and CSF for governance and risk categories, the OWASP entries for adversarial attack patterns—but no comparator covers the full surface that MBOM-PQC targets, and none integrates PQC-safe signing as a first-class field. The MBOM-PQC contribution is therefore not the introduction of provenance structure as such, but the integration of provenance, lifecycle attestation, and post-quantum cryptographic durability into a single auditable record.

3. Materials and Methods

3.1. Research Design and Contribution Type

This study employs a dual-method research design organized as two sequential phases of a design-science research program [28,29]. The first phase—Phase A, evidence collection—synthesizes authoritative policy documents, standards publications, and documented AI supply chain incidents to characterize the current state of AI supply chain risk and to identify the cryptographic dependencies that the post-quantum transition disrupts. The second phase—Phase B, artifact construction—derives a formal provenance schema, a PQC-safe signing pipeline, and a maturity model from the synthesized requirements. The boundary between phases is explicit: Section 2 and Section 4 report Phase A findings; Section 5, Section 6 and Section 7 present the Phase B artifacts. Section 8 (Discussion) and the empirical-validation roadmap in Section 8.4.5 correspond to the Demonstration and Evaluation activities specified in the Peffers et al. design-science framework, with empirical validation explicitly identified as deferred to future work.
Phase A follows PRISMA 2020 [30] adapted for policy, standards, and security-incident synthesis. The adaptation is necessary because the evidence base consists primarily of normative requirements, technical specifications, and documented attack patterns rather than experimental studies; PRISMA’s screening, inclusion-criterion, and reporting structure transfer cleanly to this corpus while the meta-analytic statistical apparatus does not apply. Phase B follows the design-science guidelines of Hevner et al. [28] (relevance to a real-world problem, rigor in construction from the evidence base, design as iterative refinement) and the activity sequence of Peffers et al. [29] (problem identification, objectives definition, design and development, demonstration, evaluation, communication). The principal contributions of this manuscript—the MBOM-PQC schema, the signing and attestation pipeline, and the SCAMM maturity model—are design-science artifacts in this sense: they are constructions derived from a structured evidence synthesis, intended for future operational validation rather than presented as empirically validated findings.
Traceability between included sources, analytical propositions, extracted requirements, and architectural components is documented through the supplementary evidence bibliography, extraction matrix, exclusion ledger, and confidence-tier summary. All extraction decisions, coding rules, and architectural traceability mappings are recorded in the Supplementary Materials. The single-author nature of this study and the compensating controls applied in the screening process are described in §3.5.

3.2. Analytical Propositions

The evidence synthesis is structured around four analytical propositions that define the conceptual scope of the review. These propositions are not hypotheses requiring statistical testing; rather, they serve as organizing assumptions that guide source selection and data extraction. AP1 holds that AI supply chain compromise is a documented and increasing threat, with attack patterns spanning training-time, ingestion-time, and deployment-time vectors. AP2 holds that cryptographic mechanisms underpin AI assurance, and that PQC transition disrupts classical assumptions about long-term integrity and authenticity. AP3 holds that existing governance and supply chain frameworks lack standardized, verifiable provenance structures for AI artifacts. AP4 holds that PQC-safe signing and hybrid signature modes can provide durable integrity guarantees but require architectural redesign of AI pipelines. Together, these propositions ensure that the synthesis captures both the threat landscape and the cryptographic requirements necessary for long-term assurance.

3.3. Search Strategy

Evidence was collected across five source classes between January 2025 and January 2026 (with two IETF Internet-Drafts [31,32] subsequently updated during manuscript revision and re-screened in March 2026). The seven databases queried, and the verbatim search strings used, are listed in Table 2. Each query was executed once at the date shown; for follow-up screening rounds during manuscript revision, the same queries were re-executed against the same databases with the date filter constrained to the intervening period.
The overall flow from 142 records returned to 54 included sources is documented in the PRISMA diagram in Figure 1. The full search-string log, including any operator or filter modifications applied by individual database front-ends, is provided in the Supplementary Materials.

3.4. Eligibility Criteria

Sources were included if they met all four of the following criteria: published between 2020 and 2026, with the core eligibility window of 2020–2025 extended to accommodate IETF Internet-Drafts updated during manuscript revision (Refs. [31,32], revised to 2026 versions; retained as transition-relevant work-in-progress for implementation context rather than primary normative authority); addressing AI supply chain risk, cryptographic integrity, or PQC transition; containing normative requirements, technical specifications, or documented incidents; and providing extractable content relevant to provenance, signing, or attestation. Sources were excluded on any of four grounds: no verifiable provenance (E1); no extractable technical or normative content (E2); superseded by a newer version of the relevant standard (E3); or not transferable to AI supply chain or cryptographic assurance contexts (E4). Exclusion codes were applied independently before arbitration to ensure consistency across the screening process.

3.5. Screening and Selection

The initial search identified 142 potentially relevant records. After deduplication (n = 19), 123 records underwent title and abstract screening. Of these, 76 records proceeded to full-text review, yielding 54 included sources: 31 policy and standards documents, 15 peer-reviewed academic papers, and 8 documented supply chain incidents. Records excluded at full-text review were coded against the exclusion criteria to support auditability. The PRISMA-style flow diagram documenting the screening and selection process is presented in Figure 1.
After full-text review, the PRISMA-screened evidence base contains 54 sources, of which 46 are cited directly in the body to support specific argumentative claims, while the remaining 8 informed the synthesis, analytical propositions, and architectural derivation [33,34,35,36,37,38,39,40]. Six additional references were added during revision in response to peer review: two design-science methodology references [28,29] cited in §3.1, one algorithm-specification reference [21] cited in §8.3.5, one TPM 2.0 platform-profile reference [41] cited in §6.3.1, and two PQC PKI migration guidance references [42,43] cited in §6.3.2. The total reference count is therefore 60. All 60 sources are listed in the References Section to comply with MDPI citation requirements for Supplementary Materials. The complete 54-source PRISMA-screened evidence bibliography with tier assignments and extraction metadata is provided in the Supplementary Materials; the six revision-time additions are flagged separately in that bibliography.
This is a single-author study. Inter-rater agreement statistics (e.g., Cohen’s kappa) are therefore not reported because there is no second rater. Three compensating controls were applied during screening to provide reproducibility in the absence of inter-rater reliability: (i) an a priori coding rubric was specified before screening began (eligibility codes I1–I4 and exclusion codes E1–E4 in §3.4), and screening decisions were recorded against the rubric in the exclusion ledger provided in the Supplementary Materials; (ii) borderline sources that resisted clear classification were defaulted to exclusion and the exclusion code documented, rather than being included on the basis of subjective assessment; (iii) the requirements-to-architecture traceability matrices in §5.4 and §7.4 serve as an internal consistency check, since each architectural component must trace back to specific included sources, surfacing any source whose inclusion is not supported by downstream use. The single-author limitation is acknowledged in §8.4 and a Delphi-style multi-rater evaluation is identified in §8.4.5 as a priority for future validation.

3.6. Data Extraction and Coding

Each source was coded using a structured extraction template with nine fields: source identifier and citation; source type (policy, standard, incident, or benchmark); confidence tier (T1 through T5); domain relevance (AI supply chain, cryptography, PQC, or cross-cutting); supported analytical proposition (AP1–AP4); extracted requirements covering provenance fields, signature constraints, and lifecycle dependencies; cryptographic parameters including key sizes, signature sizes, and hybrid mode requirements; documented vulnerabilities or attack patterns; and limitations noted by original authors. This coding structure ensures end-to-end traceability from evidence to architectural decisions, enabling reviewers to audit the derivation of each schema field, pipeline component, and maturity indicator.

3.7. Evidence Confidence Tiers

Each included source was assigned to one of five evidence-confidence tiers based on the type and authority of the source. The tier assignments are used to weight the synthesis: claims supported by Tier 1 or Tier 2 sources carry stronger evidentiary weight than claims supported only by Tier 4 or Tier 5 sources, and the requirements derived in §4.4 are anchored, where possible, in Tier 1 or Tier 2 evidence. The tiers and their criteria are:
Tier 1—Finalized normative standards. Published, formally adopted standards from NIST, NSA, ISO/IEC, or IETF (RFCs only, not Internet-Drafts). Examples in this corpus: FIPS 203 [22], FIPS 204 [2], FIPS 205 [3], SP 800-207 [44], SP 800-218 [10], RFC 9881 [45], ISO/IEC 42001:2023 [9].
Tier 2—Government policy and authoritative guidance. Published policy documents and authoritative guidance from federal agencies and equivalent national bodies, with formal endorsement (memoranda, executive orders, agency CSI publications). Examples: NSA CNSA 2.0 [11], OMB M-23-02 [12], EO 14110 [46], NSA/CISA Deploying AI Systems Securely [47], DoD CDAO RAI Toolkit [26].
Tier 3—Peer-reviewed academic literature. Articles in peer-reviewed venues with editorial oversight and double-blind or single-blind review. Examples: Carlini et al. [13], Goldblum et al. [14], Jiang et al. [15], Li et al. [18], Rieger et al. [20], Gu et al. [48], Ohm et al. [49], Ladisa et al. [17], and Zhao et al. [19].
Tier 4—Vendor advisories, incident reports, CVE-anchored disclosures. Authoritative reports from named vendors or organizations documenting specific security events with verifiable artifacts (CVE identifiers, advisory links, incident timestamps). Examples: PyTorch CVE-2023-43654 advisory [16], ReversingLabs PyPI report [4], CISA software supply chain report [5], PyTorch nightly compromise post-mortem [50], Hugging Face Hub security documentation [51], Ultralytics wheel issue [52].
Tier 5—Work-in-progress drafts and industry analyses. IETF Internet-Drafts, working-group artifacts, and named-vendor industry analyses. Used in this manuscript only for transition-pathway context, never as primary normative authority. Examples: IETF hybrid-key-exchange draft [31], IETF ECDHE-MLKEM draft [32], IETF composite ML-DSA draft [53], Microsoft failure-modes analysis [54], Google SAIF [55], and Red Hat blog [56].
The full source-to-tier assignment is provided in the Supplementary Materials. The 54 included sources break down by tier as: T1 = 11, T2 = 13, T3 = 14, T4 = 11, T5 = 5. The six revision-time additions enumerated in §3.5 (refs [21,28,29,41,42,43]) sit outside this PRISMA-screened tier accounting and are treated as supplementary citation context—standards-process algorithm specification, design-science methodology, TPM platform-profile, and PKI-migration guidance—rather than as primary evidence for the Phase-A synthesis.

3.8. Requirements-to-Architecture Traceability

To ensure transparency in how evidence informed the proposed framework, extracted requirements were mapped to three artifact classes: MBOM-PQC schema fields, PQC-safe signing pipeline components, and Supply Chain Assurance Maturity Model (SCAMM) indicators. This traceability matrix demonstrates that the architectural artifacts derive directly from synthesized evidence rather than subjective interpretation and provides a structured basis for future validation, extension, and peer review. The full matrix is provided in the Supplementary Materials and is summarized in Section 5.4. The results of the evidence synthesis are presented in four stages. Section 4 characterizes the AI supply chain threat landscape and derives four requirement classes from documented threats and cryptographic dependencies. Section 5 translates those requirements into the MBOM-PQC schema, a structured provenance model for AI artifacts. Section 6 operationalizes the schema through a PQC-safe signing and attestation pipeline. Section 7 introduces the Supply Chain Assurance Maturity Model (SCAMM), which enables repeatable organizational assessment against the requirements, schema, and pipeline defined in the preceding sections.

4. Synthesis of Threats and Derived Requirements

AI supply chains introduce a multilayered attack surface spanning data acquisition, model development, dependency management, training pipelines, and deployment workflows. These stages rely on cryptographic mechanisms—signatures, certificates, secure channels, and attestation—that will be disrupted by the transition to post-quantum cryptography (PQC). This section synthesizes evidence from policy documents, standards publications, and documented incidents to characterize the threat landscape and identify the cryptographic dependencies that must be addressed to ensure durable AI supply chain integrity (Figure 2 and Figure 3).

4.1. AI Supply Chain Attack Surface

The AI supply chain comprises a sequence of interdependent stages, each with distinct vulnerabilities. Unlike traditional software supply chains, AI artifacts such as model weights, training datasets, and hyperparameter configurations are opaque and difficult to inspect, making cryptographic verification essential.

4.1.1. Training-Time Threats

Training-time compromise remains one of the most damaging forms of AI supply chain attack. Data poisoning allows adversaries to inject manipulated samples into training datasets to bias model behavior [13,14,57]. Model poisoning introduces malicious gradients or updates during distributed or federated training. Backdoor insertion embeds hidden triggers in the model to enable targeted misclassification at inference time, a threat class comprehensively evaluated in controlled benchmarks [58]. These attacks exploit the fact that training data and intermediate artifacts often lack cryptographic integrity protections or provenance metadata, allowing tampering to remain undetected through multiple downstream uses of the model.

4.1.2. Ingestion-Time Threats

Organizations frequently ingest pre-trained models from public repositories or third-party vendors. Documented incidents and security research indicate that pre-trained models and supporting repositories can be tampered with during distribution, and that dependency ecosystems such as PyPI and NPM can be abused to deliver malicious ML libraries [4,15,16]. Without verifiable provenance, organizations cannot reliably determine whether ingested models originate from trusted sources, making ingestion-time verification a critical control gap.

4.1.3. Deployment-Time Threats

Deployment introduces additional risks, including model tampering during packaging or containerization, unauthorized model updates in continuous deployment pipelines, and inference-time manipulation where adversaries exploit weaknesses in model integrity checks. These threats highlight the need for end-to-end signing and attestation across the entire model lifecycle, extending well beyond the point of initial training to cover every stage at which model artifacts are transferred, transformed, or executed.

4.2. Cryptographic Dependencies in AI Pipelines

AI supply chains rely on cryptographic mechanisms at multiple points, often implicitly. Mapping these dependencies is necessary to identify where PQC transition creates gaps in long-term assurance.

4.2.1. Model Signing and Verification

Model signing is used to authenticate the origin of model artifacts, detect tampering during distribution or deployment, and establish trust boundaries between training and inference environments. Most current implementations use classical signatures (RSA, ECDSA, Ed25519), which are vulnerable to quantum-enabled forgery through harvest-now, forge-later (HNFL) attacks [2,3,4,5,6,7,8,9,10,11]. As models acquire long operational lifetimes in mission-critical applications, the durability of these signing mechanisms against future quantum attacks becomes a primary assurance concern.

4.2.2. Dataset Integrity and Lineage

Datasets are rarely signed, and when they are, classical signatures are used. PQC transition affects long-term dataset integrity guarantees, lineage verification for sensitive or regulated datasets, and compliance with audit and accountability requirements. The absence of cryptographic dataset provenance means that organizations relying on AI systems in healthcare, defense, or financial services may be unable to demonstrate the integrity of their training data under future regulatory frameworks that require PQC-safe assurance.

4.2.3. Secure Training and Deployment Pipelines

Training pipelines rely on TLS for secure data transfer, certificate chains for authenticating build systems, and secure enclaves for protecting model execution. PQC transition affects all three due to increased key sizes, larger signature sizes, and hybrid mode requirements during the transition period [31,32]. Organizations must plan for certificate chain updates, enclave firmware upgrades, and TLS configuration changes as part of any PQC migration that touches AI infrastructure.

4.2.4. Federated Learning and Distributed Training

Federated learning introduces additional cryptographic dependencies for client authentication, update signing, and aggregator verification; documented adversarial threats to federated model updates [20] further reinforce the need for cryptographically anchored update integrity. PQC-safe signatures are required to prevent forgery of model updates in long-lived federated systems. As federated deployments scale across organizational boundaries—particularly in defense and healthcare contexts—the communication overhead introduced by larger PQC signature sizes must be explicitly addressed in system design and capacity planning.

4.3. Lifecycle Vulnerabilities Across AI Supply Chains

AI artifacts pass through multiple lifecycle stages, each with distinct integrity requirements and cryptographic dependencies. A comprehensive provenance model must address each stage explicitly.

4.3.1. Pre-Training

Pre-training relies on large, heterogeneous datasets that often lack provenance metadata, integrity verification, and cryptographic lineage. This stage is highly vulnerable to poisoning and dataset manipulation. Because pre-training artifacts form the foundation of all downstream model behavior, integrity failures at this stage propagate silently through every subsequent lifecycle phase.

4.3.2. Fine-Tuning

Fine-tuning introduces new risks through the incorporation of unverified domain-specific datasets, the integration of third-party model checkpoints, and exposure to malicious hyperparameter configurations. Fine-tuning pipelines typically lack signing or attestation mechanisms, creating a window in which tampered base models or poisoned domain data can alter model behavior without detection. The MBOM-PQC schema must capture fine-tuning provenance as a distinct lifecycle component with its own integrity fields.

4.3.3. Packaging and Distribution

Model packaging workflows depend on container signing, artifact registries, and dependency resolution [59]. PQC transition disrupts these mechanisms due to signature size and certificate chain constraints. Organizations must update container signing infrastructure to support FIPS 204 (ML-DSA) or hybrid signatures, and artifact registry configurations must be updated to validate PQC-compatible certificate chains before model distribution can be considered cryptographically assured.

4.3.4. Deployment and Continuous Learning

Deployment introduces model update channels, runtime attestation, and continuous learning loops that all require durable cryptographic guarantees that classical signatures cannot provide. In continuous learning environments, models evolve post-deployment, meaning that each update cycle must be treated as a new supply chain event with its own provenance record, signing event, and attestation check. This requirement extends the scope of AI supply chain security from a point-in-time control to a persistent, lifecycle-spanning governance function.

4.4. Requirements Derived from Threats and Dependencies

The requirements presented below are derived from the threat and dependency analysis in §4.1–§4.3 by an explicit derivation rule rather than by rhetorical continuity. For each threat class T identified in §4.1–§4.3, a requirement R is derived such that satisfying R prevents, detects, or mitigates T at the lifecycle stage where T originates. Where T has no existing mitigation in the standards corpus reviewed in §2—that is, where the gap analysis in Table 1 shows the requirement-relevant dimension as absent or only partially covered—R is treated as a prescriptive contribution of this manuscript and is operationalized in the artifacts presented in Section 5, Section 6 and Section 7. Where existing mitigations are partially covered, R augments rather than replaces them, and the augmentation is identified explicitly in the per-requirement-class discussion below. Each of the four requirement classes—provenance, integrity, lifecycle, and supply chain transparency—is accordingly opened by a one-sentence statement of the threat-to-requirement derivation that produced it.
Synthesizing the threat landscape and cryptographic dependencies yields four requirement classes that directly inform the design of the MBOM-PQC schema and PQC-safe signing pipeline presented in Section 5 and Section 6.

4.4.1. Provenance Requirements

This requirement class is derived from threat classes training-time and ingestion-time (§4.1.1, §4.1.2), together with lifecycle vulnerabilities at pre-training (§4.3.1); existing mitigations in the standards corpus (NIST AI RMF [1], NIST SSDF [10], SPDX, CycloneDX) provide partial coverage of dependency tracking but no coverage of AI-specific provenance fields, as shown in Table 1.
AI supply chains require complete lineage metadata for models, datasets, and dependencies; immutable provenance records; verifiable source attribution; and a standardized schema for AI-specific artifacts. These requirements address the opacity gap identified across all three attack-time phases and provide the foundation for the MBOM-PQC schema defined in Section 5.

4.4.2. Integrity Requirements

This requirement class is derived from the threat classes of quantum-enabled forgery and HNFL (§4.2.1, §1) and from the cryptographic-dependency analysis of model signing (§4.2.1) and pipeline TLS/certificate chains (§4.2.3); existing mitigations cover classical signing but not PQC-safe signing or hybrid signature modes, with FIPS 204 [2] and FIPS 205 [3] providing the algorithmic basis for the requirement.
Integrity must be ensured through PQC-safe signatures using FIPS 204 (ML-DSA) for operational artifacts and FIPS 205 (SLH-DSA) for non-NSS long-term archival integrity, hybrid signature modes during the transition period, PQC-safe certificate chains, and cryptographically anchored attestation. These requirements respond directly to the cryptographic dependency gaps identified in Section 4.2 and define the algorithmic and architectural constraints for the signing pipeline introduced in Section 6.

4.4.3. Lifecycle Requirements

This requirement class is derived from threat classes fine-tuning tampering and deployment-time tampering (§4.3.2, §4.1.3), together with continuous-learning integrity gaps (§4.3.4); existing mitigations in NIST SSDF [10] and SP 800-204D [25] provide pipeline-stage controls but do not extend to the full AI lifecycle, leaving the multi-stage provenance structure as a prescriptive contribution of this manuscript.
Integrity and provenance must be maintained across pre-training, fine-tuning, packaging, deployment, and continuous learning. This requirement reflects the lifecycle vulnerability analysis in Section 4.3 and drives the multi-stage provenance structure of the MBOM-PQC schema, which must capture distinct integrity state at each lifecycle transition rather than treating the model as a static artifact.

4.4.4. Supply Chain Transparency Requirements

This requirement class is derived from the systemic-opacity threat identified across §4.1–§4.3 and from the third-party-dependency vulnerability pattern documented in [4,5,16,17]; existing mitigations in NIST AI RMF [1] and SP 800-207 (Zero Trust) [44] provide governance and trust-decision frameworks but do not specify the evidence structures required to support those decisions for AI artifacts, leaving the schema-level transparency requirements as a prescriptive contribution of this manuscript.
Organizations require visibility into model dependencies, verification of third-party components, detection of tampered or malicious artifacts, and integration with Zero Trust and AI RMF governance models [1,44]. These transparency requirements address the systemic opacity of AI supply chains identified in the threat analysis and connect the technical framework to existing enterprise governance structures. In the Supply Chain Assurance Maturity Model (SCAMM) presented in Section 7, this requirement class is operationalized as the lifecycle governance dimension, reflecting the fact that supply chain transparency is ultimately sustained through governance structures that enforce it across the model lifecycle. Together, the four requirement classes form the foundation for the formal provenance schema (MBOM-PQC), PQC-safe signing pipeline, and Supply Chain Assurance Maturity Model (SCAMM) introduced in subsequent sections.

5. MBOM-PQC: Proposed Provenance Schema

The artifacts presented in this section and in Section 6 and Section 7 are design-science artifacts in the sense established in §3.1: constructions derived from the Phase-A evidence synthesis (Section 2 and Section 4) by the derivation rule stated in §4.4, and intended for future operational validation rather than reported as empirically validated findings. Where claim language in this section uses formative verbs such as specifies, defines, or captures, these refer to the schema’s design intent; where verbs such as supports or enables appear, these are conditional on faithful implementation of the schema by adopting organizations. Empirical evaluation of the schema across heterogeneous model ecosystems is identified as future work in §8.4.5.
AI supply chains require a structured, verifiable method for documenting the origin, composition, and integrity of model artifacts. Existing software supply chain mechanisms—such as Software Bills of Materials (SBOMs) defined by SPDX and CycloneDX—provide foundational concepts but lack the semantic richness needed to capture AI-specific artifacts such as training datasets, hyperparameters, pre-trained model dependencies, and fine-tuning workflows. Moreover, current provenance formats rely on classical digital signatures that will not provide long-term protection against quantum-enabled forgery. To address these gaps, this section introduces the Model Bill of Materials with PQC-Safe Extensions (MBOM-PQC): a formal provenance schema designed to ensure durable, cryptographically anchored trust in AI supply chains throughout the post-quantum transition.

5.1. Design Principles

The MBOM-PQC schema is grounded in four design principles derived from the threat and dependency analysis in Section 4.

5.1.1. Completeness

The schema must capture all artifacts that influence model behavior, including datasets, pre-trained models, hyperparameters, training code, and environmental configurations. Partial provenance is insufficient for detecting poisoning or tampering; incomplete lineage records create audit gaps that adversaries can exploit.

5.1.2. Verifiability

All provenance elements must be cryptographically verifiable using PQC-safe or hybrid signatures. Provenance records must be immutable and resistant to forgery, enabling downstream consumers of model artifacts to independently confirm origin and integrity without relying on the original producer.

5.1.3. Cryptographic Durability

Provenance must remain trustworthy for the operational lifetime of the model, which in defense, healthcare, and critical infrastructure contexts may span decades. This requires PQC-safe signatures using FIPS 204 (ML-DSA) and, for non-NSS archival artifacts, FIPS 205 (SLH-DSA), as well as hybrid signature modes during the transition period to maintain backward compatibility while establishing quantum resistance.

5.1.4. Supply Chain Transparency

The schema must expose dependencies across the entire AI lifecycle, enabling organizations to assess risk, detect tampering, and enforce Zero Trust principles. Transparency is not merely a reporting capability but a structural property: provenance records must be machine-readable, interoperable with existing governance tooling, and auditable by Authorizing Officials and program managers.

5.2. Schema Overview and Core Components

The MBOM-PQC schema is organized into seven core components, each representing a distinct category of AI supply chain artifacts. Together, they form a comprehensive provenance record that can be signed, verified, and attested across the model lifecycle (Figure 4).

5.2.1. Component 1: Model Metadata

This component captures high-level information establishing the identity of the model artifact: model name and version, architecture type (e.g., transformer, CNN, diffusion), intended use and deployment context, model owner and publisher, and creation and modification timestamps. These fields provide the anchor to which all downstream provenance components are cryptographically linked.

5.2.2. Component 2: Pre-Training Dataset Lineage

This component documents datasets used during pre-training, including dataset identifiers and versions, source repositories, licensing and usage constraints, data collection methodology, PQC-safe hashes and signatures, and known limitations or biases. Dataset lineage is essential for detecting poisoning and ensuring regulatory compliance; it is the most foundational component because training data determines base model behavior for all subsequent fine-tuning and deployment.

5.2.3. Component 3: Pre-Trained Model Dependencies

This component captures upstream model dependencies, including model identifiers and versions, source repositories such as HuggingFace or vendor registries, PQC-safe signatures of upstream models, known vulnerabilities or CVEs, and compatibility constraints. These fields enable verification of model inheritance chains and provide a structured basis for assessing third-party model risk before ingestion.

5.2.4. Component 4: Fine-Tuning Artifacts

This component documents all artifacts used during fine-tuning: fine-tuning datasets, hyperparameters, training scripts and configuration files, random seeds and initialization parameters, and PQC-safe signatures of all artifacts. Fine-tuning is a common point of compromise; detailed provenance at this stage is essential for detecting domain-specific poisoning and for attributing behavioral changes to specific training inputs.

5.2.5. Component 5: Training Environment and Pipeline

This component captures the environment in which training occurred: hardware configuration (CPU/GPU/TPU), software stack (framework versions and libraries), container images and digests, secure enclave or confidential computing details, and pipeline attestation records. These fields support both reproducibility and pipeline integrity verification, enabling auditors to confirm that the training environment matched approved configurations.

5.2.6. Component 6: Deployment Packaging

This component documents packaging and distribution artifacts: container images, model packaging formats (ONNX, TorchScript, TensorRT), PQC-safe signatures of deployment artifacts, and dependency graphs for runtime libraries. It is designed so that deployment artifacts can be matched cryptographically to the signed provenance record, closing the gap between training-time integrity and deployment-time verification.

5.2.7. Component 7: Cryptographic Integrity Fields

This component provides the PQC-safe integrity anchors for the entire provenance record: FIPS 204 signatures for model artifacts, FIPS 205 signatures for non-NSS long-term provenance records, hybrid signature bundles combining classical and PQC signatures, PQC-safe certificate chains, and key rotation metadata. This component is intended to keep provenance verifiable throughout the PQC transition and beyond, and serves as the cryptographic root of trust for the entire MBOM-PQC schema (Figure 5). Figure 4 presents the full seven-component conceptual provenance model, while Figure 5 provides a schema-oriented abstraction that groups those components into five artifact classes for implementation.

5.3. PQC-Safe Extensions

Hybrid signature modes as treated in this manuscript reflect the operational transition patterns documented in current IETF working-group drafts [31,32,53]; they do not yet have the status of finalized normative IETF guidance. Specific composite-signature formats and PQC-safe certificate profiles will likely evolve as those drafts are revised, advanced to RFC status, or superseded. The MBOM-PQC schema is therefore designed at the algorithm level—specifying that a hybrid bundle binds a classical and a post-quantum signature over a common payload, and that the bundle is recorded in the Cryptographic Integrity Fields component (C7)—rather than at the level of any specific work-in-progress encoding. Implementers should select the encoding (composite signature per draft-ietf-lamps-pq-composite-sigs, parallel signature, or alternatives) appropriate to the IETF state at the time of implementation. The remainder of §5.3 describes the architectural roles played by the hybrid bundle, certificate chain, and long-term integrity anchors at this algorithm-level abstraction.
The MBOM-PQC schema introduces three PQC-specific extensions that differentiate it from classical provenance models and ensure cryptographic durability across the transition period.

5.3.1. Hybrid Signature Bundles

During the current transition period, informed by emerging CNSA 2.0 and federal PQC migration timelines [11], provenance records must include hybrid signature bundles comprising a classical signature (e.g., ECDSA), a PQC signature (e.g., FIPS 204/ML-DSA), and combined verification metadata. This dual-signing approach is intended to maintain backward compatibility with existing verification tooling while establishing PQC-safe integrity guarantees for the model’s full operational lifetime.

5.3.2. PQC-Safe Certificate Chain Fields

Certificate chains embedded in provenance records should be designed to support PQC-safe or hybrid certificate-chain evolution, incorporating PQC-safe root certificates, hybrid intermediate certificates, and PQC-safe key usage constraints as the supporting PKI infrastructure matures. This enables end-to-end verification of provenance records and is designed so that the trust chain anchoring model authenticity remains valid even after classical certificate authorities are deprecated or compromised by quantum-capable adversaries.

5.3.3. Long-Term Integrity Anchors

For non-NSS artifacts with multi-year lifetimes, the schema employs FIPS 205 (SLH-DSA) signatures for archival integrity, time-stamped PQC-safe attestations, and immutable provenance logs. FIPS 205 is selected for long-term anchoring because its security is based on hash functions rather than algebraic assumptions, making it the most conservative choice for artifacts that must remain verifiable over extended time horizons where algorithm confidence may evolve.

5.4. Requirements-to-Schema Traceability

Each element of the MBOM-PQC schema maps directly to requirements derived from the threat and dependency analysis in Section 4. The traceability matrix below (Table 3) demonstrates that every schema component is grounded in documented supply chain risks and cryptographic dependencies rather than abstract design choices. This mapping provides a structured basis for auditing schema completeness and for extending the schema as new threat classes or PQC standards emerge.

5.5. Summary

By integrating PQC-safe signatures, hybrid modes, and lifecycle-wide transparency across seven structured components, it enables organizations to verify the authenticity, integrity, and lineage of AI artifacts throughout the post-quantum transition. The traceability matrix in Table 3 confirms that every schema element is grounded in documented threats and cryptographic requirements. The MBOM-PQC schema forms the foundation for the PQC-safe signing and attestation pipeline introduced in Section 6 and the Supply Chain Assurance Maturity Model presented in Section 7.

6. PQC-Safe Signing and Attestation: Proposed Pipeline

The MBOM-PQC schema defined in Section 5 provides the provenance structure for AI supply chain artifacts. To operationalize that structure, organizations require a corresponding pipeline: a defined sequence of cryptographic operations that generates, applies, and verifies PQC-safe signatures and attestations across the model lifecycle. This section introduces the PQC-Safe Model Signing and Attestation Pipeline—a five-stage operational architecture that integrates FIPS 204 (ML-DSA) signing for operational artifacts, FIPS 205 (SLH-DSA) signing for non-NSS archival records, hybrid signature modes, hardware-rooted attestation, and Zero Trust-aligned trust scoring into a coherent, implementable workflow.

6.1. Pipeline Overview

The pipeline comprises five sequential stages: Ingestion, Verification, Signing, Attestation, and Deployment (Figure 6). Each stage produces a distinct cryptographic output that feeds the next, creating an unbroken chain of provenance from artifact acquisition through operational use. The pipeline is designed to be modular, allowing organizations to implement individual stages incrementally in alignment with their SCAMM maturity level, while ensuring that the full five-stage sequence satisfies the integrity and attestation requirements derived in Section 4.4. The architecture-layer view (Figure 7) illustrates how the key management, signing service, attestation engine, and policy enforcement components support this workflow.

6.1.1. Stage 1—Ingestion

During ingestion, model artifacts, datasets, and dependencies are acquired from internal or external sources. Each artifact is catalogued against its MBOM-PQC provenance record, and a cryptographic hash is computed and recorded. Source provenance is checked against known repositories and vendor attestations. Artifacts without verifiable provenance are quarantined pending manual review. This stage establishes the artifact inventory that all subsequent pipeline stages act upon.

6.1.2. Stage 2—Verification

During verification, existing signatures on ingested artifacts are validated against the MBOM-PQC record. In hybrid mode, PQC-capable verifiers validate both the classical and PQC legs of the bundle; legacy verifiers may validate the classical leg only, with reduced transition-period assurance. Artifacts bearing only classical signatures are flagged for re-signing at the next stage. Certificate chain validation confirms that signing keys trace to a trusted PQC-safe root. Verification failures halt pipeline progress and trigger incident response workflows, preventing potentially compromised artifacts from advancing toward deployment.

6.1.3. Stage 3—Signing

During signing, verified artifacts are signed using the algorithm mode appropriate to their expected lifetime and sensitivity. Standard model artifacts receive FIPS 204 signatures. Long-lived non-NSS archival artifacts—including provenance records, dataset manifests, and training environment snapshots—receive FIPS 205 signatures. During the transition period, hybrid bundles combining a classical ECDSA signature with the appropriate PQC signature are generated and stored with the artifact. All signatures are recorded in the MBOM-PQC Cryptographic Integrity Fields (Component 7).

6.1.4. Stage 4—Attestation

During attestation, a hardware-rooted attestation record is generated confirming that the signing process executed in a verified, approved environment. This record binds the signed artifact to the specific hardware, firmware, and software configuration of the signing platform, using TPM-based or secure enclave attestation. The attestation report is itself signed with a PQC-safe key and appended to the MBOM-PQC record. Remote attestation enables downstream consumers to verify pipeline environment integrity independently of the signing organization.

6.1.5. Stage 5—Deployment

During deployment, the signed and attested artifact is released to the operational environment. The deployment system verifies the MBOM-PQC record, confirms signature validity, and checks the attestation report before permitting execution. Deployment gate checks are logged to the provenance record, creating an auditable trail from artifact origin through operational activation. Post-deployment, any model update triggers re-entry into the pipeline at Stage 1, ensuring that continuous learning environments maintain the same integrity guarantees as initial deployments.

6.2. PQC-Safe Signing Flow

The signing flow within Stage 3 implements a three-mode signing architecture that adapts to the artifact type, lifetime, and organizational PQC readiness level.

6.2.1. Hybrid Mode Signing

Hybrid mode is the recommended default during the current transition period, informed by CNSA 2.0 and federal PQC migration timelines [11]. Hybrid-signature considerations in this paper are presented as an architectural transition pattern rather than as a finalized IETF normative construct. The cited IETF drafts [31,32] primarily inform hybrid key-establishment and TLS migration mechanics, while signature and attestation design choices are grounded in the NIST FIPS-standardized PQC algorithms and associated assurance requirements (Figure 6). Each artifact receives two concurrent signatures: a classical ECDSA or Ed25519 signature for backward compatibility with existing verification infrastructure, and a FIPS 204 (ML-DSA) signature providing quantum resistance. Both signatures are stored in the MBOM-PQC Cryptographic Integrity Fields and are independently verifiable. Verifiers that have not yet migrated to PQC tooling can still validate the classical signature, while PQC-capable verifiers validate both, gaining stronger assurance. Refs. [31,32] are cited as current, transition-relevant IETF work-in-progress on hybrid TLS key-establishment and deployment mechanics, not as primary normative authority for the manuscript’s hybrid-signature or attestation architecture. IETF drafts on composite digital signatures and PQC X.509 certificate profiles are progressing separately and should be reviewed against current working-group output at the time of deployment.

6.2.2. FIPS 204 (ML-DSA) Signing for Standard Artifacts

ML-DSA (FIPS 204) is used as the primary signing algorithm for model weights, packaging artifacts, and pipeline execution records. ML-DSA-65 is the recommended parameter set, balancing signature size (3309 bytes, approximately 3.3 KB) against security level (NIST Level 3) [2]. Organizations with constrained distribution channels may use ML-DSA-44 (NIST Level 2) for internal artifacts, reserving ML-DSA-87 (NIST Level 5) for high-assurance artifacts deployed in national security or critical infrastructure contexts.
While ML-DSA-65 is presented as the default for the civilian/commercial profile throughout §6.2, organizations operating in National Security Systems (NSSs) or other high-assurance contexts require distinct parameter selections. Table 4 specifies four algorithm profiles aligned with deployment context; profile selection is contextual, and one parameter set does not fit all use cases.

6.2.3. FIPS 205 (SLH-DSA) for Long-Term Artifacts

SLH-DSA (FIPS 205) is reserved for artifacts that must remain verifiable over multi-year horizons: dataset manifests, provenance logs, training environment snapshots, and archival MBOM-PQC records. SLH-DSA’s hash-based construction is conservative relative to ML-DSA’s lattice-based assumptions, providing higher confidence in long-term security at the cost of larger signature sizes (approximately 8–50 KB depending on parameter set). Parameter set selection should reflect both retention period and mission criticality: SLH-DSA-128s (NIST Level 1) is appropriate for shorter-horizon, lower-risk archival (commercial models with retention measured in single-digit years); SLH-DSA-192s (NIST Level 3) is appropriate for regulated-industry archives with multi-decade retention requirements; and SLH-DSA-256s (NIST Level 5) is appropriate for decades-long high-assurance non-NSS records and mission-critical regulated-industry archives requiring NIST Level 5 strength, consistent with the algorithm-profile assignments in Table 4 (§6.2.2). FIPS 205 (SLH-DSA) is not currently approved for NSS use; NSS deployments apply ML-DSA-87 per CNSA 2.0 [11] for both operational signing and archival integrity. Across security categories, the ‘s’ (small-signature) variants are generally preferred over ‘f’ (fast-signing) variants for archival use, since signing is a one-time cost while signature size is amortized over the artifact’s full retention period.

6.2.4. PQC-Safe Key Management

PQC signing keys must be generated, stored, and rotated in alignment with CNSA 2.0 transition expectations and NIST standardization guidance for FIPS 204 (ML-DSA) for National Security System contexts, and applicable NIST guidance for FIPS 205 (SLH-DSA) deployments in non-NSS federal and commercial contexts. FIPS 204 private keys must be stored in hardware security modules (HSMs) or secure enclaves that support PQC key operations; FIPS 205 keys, used for non-NSS archival integrity, are subject to the same hardware storage requirements. Key rotation schedules must be documented in the MBOM-PQC record, and historical signing keys must be retained and protected to support retrospective verification of previously signed artifacts. Organizations must plan for the larger key storage footprint introduced by PQC algorithms relative to classical counterparts.

6.2.5. Worked Example: 110M-Parameter Transformer Checkpoint

To make the signing flow concrete, this subsection traces the application of the schema (§5) and the pipeline (§6.1–§6.2.4) to a representative artifact: a fine-tuned 110M-parameter transformer encoder distributed in the safetensors format (FP32, ≈440 MB). The example is presented as a worked illustration of the pipeline’s expected behavior; it does not constitute an empirical evaluation, and the validation activities of §8.4.5 are required before the example can be cited as evidence of operational performance.
The artifact ingestion stage (§6.1, Stage 1) catalogs three input files—the model weights file, the tokenizer configuration, and the model card—and computes SHA-3-256 hashes over each. (SHA-3-256 is preferred over SHA-256 for alignment with FIPS 205’s SHAKE-based construction and for design-diversity future-proofing; hash function selection should in any case meet the collision- and pre-image-resistance strength required for the artifact class, per §5.3.3 and the Figure 5 caption qualifying note.) The hashes populate Component C1 (Model Metadata) and C7 (Cryptographic Integrity Fields) of the MBOM-PQC record. The dataset lineage component (C2) is populated from the model card’s documented training data sources, with a separate hash recorded for each upstream dataset reference; pre-trained model dependencies (C3) record the upstream foundation model identifier and its own MBOM-PQC reference if available. The fine-tuning artifacts component (C4) records the fine-tuning dataset hash, the hyperparameter configuration, and a hash of the fine-tuning script. The training environment component (C5) records the build platform identifier, library versions, and the TPM-rooted attestation quote (§6.4.1) of the signing host.
The signing stage (§6.1, Stage 3) generates two signatures over the canonicalized MBOM-PQC record: (i) an ML-DSA-65 signature (3309 bytes) for the operational artifact, per FIPS 204 [2]; and (ii) an ECDSA-P256 signature (≈71 bytes) over the same payload, for backward verifier compatibility. The two signatures, together with the certificate chain (which itself includes the PQC-safe public key and the issuing CA chain), form the hybrid bundle of total size ≈ 11.8 KB recorded in C7. For long-lived archival of the same artifact’s provenance manifest (rather than the model weights themselves), an SLH-DSA-128s signature (7856 bytes) is generated in addition; this artifact is recorded as a separate record in C7 with its own integrity field.
The attestation stage (§6.1, Stage 4) generates a TPM-rooted attestation report binding the signing operation to the verified-boot state of the signing host. The attestation report is itself signed with the host’s PQC-safe attestation key and appended to the MBOM-PQC record. At the deployment stage (§6.1, Stage 5), the consuming system verifies the hybrid bundle against the recorded certificate chain, validates the attestation report, and consults the policy enforcement schema (§6.4) before permitting the artifact to load.
Across this end-to-end flow, the absolute bytes added to the artifact distribution by the MBOM-PQC record and the hybrid bundle total ≈11.8 KB regardless of the underlying model size. For the 440 MB transformer in this example, the relative overhead is ≈0.0026% of the artifact size; for larger model classes the relative overhead decreases asymptotically. The full quantitative analysis across model scales is presented in §8.3.5. A machine-readable JSON-LD instantiation of the complete MBOM-PQC record for this transformer example is provided in the Supplementary Materials.

6.3. Attestation Architecture

Attestation extends the assurance provided by signing by binding signed artifacts to the verified state of the environment in which they were processed. This transforms provenance from a claim about artifact content into a verifiable statement about the entire signing context.

6.3.1. Hardware Root of Trust

The attestation architecture is anchored in a hardware root of trust, implemented via Trusted Platform Module (TPM) 2.0 or equivalent secure enclave technology, consistent with platform resiliency guidance [56] (Figure 6). The hardware root provides an unforgeable measurement of the platform state at signing time, including firmware, bootloader, operating system, and signing application configuration. This measurement is recorded in the attestation report and signed with a PQC-safe endorsement key. Organizations migrating to PQC must ensure that their TPM or enclave firmware supports PQC endorsement key operations; hybrid (classical + PQC) attestation paths are available during the transition period; hardware upgrades may be required in legacy environments. Practical migration considerations for organizations whose existing TPM and HSM inventory does not yet support FIPS 204/FIPS 205 natively—including phased adoption strategies and a qualitative cost matrix—are addressed in §8.3.6. The pipeline architecture treats hardware-root-of-trust upgrade as a configurable maturity dimension (mapping to SCAMM Level 4 in §7.2) rather than a day-1 prerequisite, allowing organizations to advance through earlier maturity levels using software-rooted attestation while hardware refresh proceeds.

6.3.2. PQC-Safe Certificate Chains

Attestation reports and model signatures are bound to a certificate-chain design that can evolve toward PQC-safe or hybrid trust anchors during transition, extending from a trusted root certificate authority to the signing platform’s endorsement key. During the transition period, hybrid certificate chains are used: each certificate in the chain carries both a classical and a PQC signature, allowing verification by both legacy and PQC-capable verifiers. Organizations operating in federal environments must align certificate chain updates with GSA and CISA PQC PKI migration guidance [42,43] and CNSA 2.0 timelines [11].

6.3.3. Remote Attestation

Remote attestation enables a relying party to verify the integrity of the signing environment without physical access to the signing platform. The attestation report—a signed, hardware-rooted statement of platform state [56]—is published alongside the signed artifact and can be independently verified by any party with access to the endorsement key certificate chain. This capability is particularly valuable in federated or multi-organization supply chains where trust must be established across organizational boundaries without requiring bilateral agreements about physical infrastructure.

6.4. Integration with Zero Trust Architecture and AI RMF

The PQC-safe signing and attestation pipeline is designed to integrate with existing enterprise governance frameworks rather than operate as a standalone security control. Two integration points are particularly important for federal and defense deployments.

6.4.1. Zero Trust Architecture Integration

Within a Zero Trust Architecture (ZTA), every model artifact is treated as untrusted until verified. The pipeline operationalizes this principle by producing a pipeline-verified trust score for each artifact, derived from signature validity, attestation report status, provenance completeness, and dependency verification outcome. This trust score is surfaced to ZTA policy decision points, enabling dynamic access controls that restrict model deployment or inference based on real-time supply chain integrity status. Models with incomplete provenance, expired signatures, or failed attestation are denied deployment regardless of network location or user identity (Figure 8). For multi-cloud and cloud-native AI deployments, NIST SP 800-207A [60] further specifies ZTA-based access-control mechanisms for which the pipeline-derived trust scores in this manuscript provide an AI-artifact-level assurance input.

6.4.2. AI RMF Integration

The pipeline maps to the AI RMF GOVERN, MAP, MEASURE, and MANAGE functions [1]. GOVERN: pipeline policies are documented in organizational governance frameworks. MAP: provenance records identify AI artifacts and their dependencies. MEASURE: signature validity, attestation status, and provenance completeness provide measurable supply chain integrity indicators. MANAGE: trust scores and verification outcomes inform deployment, decommissioning, and incident response decisions. This integration is intended to keep pipeline outputs immediately actionable within established AI governance processes, avoiding the creation of parallel security tracks competing for organizational attention.

6.5. Continuous-Learning Pipeline Modes

The five-stage pipeline of §6.1 is specified for the case of a discrete model release: an artifact is acquired, verified, signed, attested, and deployed once. AI deployments that involve continuous learning—incremental fine-tuning on streaming data, federated update aggregation, or scheduled retraining—present additional complexity, because executing the full five-stage pipeline at every iteration would impose computational and signing-key-management overhead that may exceed the operational benefit of the updates themselves. This subsection defines three operational modes for continuous-learning deployments and specifies the conditions under which each is appropriate. The three modes are illustrated in Figure 9, complementing the discrete-release pipeline of Figure 6 (§6.1).
Full re-sign mode. The complete five-stage pipeline is executed and a fresh hybrid bundle is generated over the updated artifact. This mode is appropriate for major version increments, security-critical updates (CVE-driven dependency replacements, suspected compromise of a prior signing key, structural changes to model architecture), and updates that cross an organizational maturity-level boundary. The artifact’s MBOM-PQC record is replaced rather than appended.
Delta-sign mode. A signature is generated over the delta between the current and prior signed artifact—typically the weight update tensor produced by the fine-tuning step—together with a reference to the prior signed checkpoint. The verifier reconstructs the current artifact from the prior checkpoint plus the signed delta and validates the integrity chain transitively. This mode is appropriate for incremental fine-tuning where the weight-change magnitude is bounded and the prior checkpoint is itself within the verification window. The MBOM-PQC record is appended with a new C7 entry rather than replaced.
Batched-checkpoint mode. Signing is applied at scheduled checkpoints rather than per-iteration, with the checkpoint cadence determined by organizational policy (e.g., daily, hourly, every N gradient steps). Between checkpoints, the model state is recorded in an unsigned operational log; the next checkpoint signs the cumulative state and references the prior signed checkpoint. This mode is appropriate for high-frequency online learning where per-iteration signing would dominate the training-step latency.
The selection of mode for a given continuous-learning deployment is determined by a three-input decision rule: (i) update frequency, with full re-sign appropriate for low frequencies (≤1 update per day), delta-sign appropriate for moderate frequencies, and batched-checkpoint required for high frequencies (≥1 update per minute); (ii) criticality tier per organizational policy, with security-critical updates always invoking full re-sign regardless of frequency; (iii) weight-change magnitude, with updates exceeding an organization-defined L2-norm threshold relative to the prior signed checkpoint invoking full re-sign even at high frequency. The decision rule is summarized in Figure 9 and elaborated in the operational guidance in the Supplementary Materials. Open research questions concerning the formal verification of delta-sign correctness, the bounded-staleness guarantees of the batched-checkpoint mode, and the interaction between continuous-learning mode and SCAMM maturity levels are discussed in §8.4.4.

7. SCAMM: Proposed Maturity Model

The MBOM-PQC schema and PQC-Safe signing and attestation pipeline introduced in Section 5 and Section 6 provide the technical mechanisms for capturing and verifying AI supply chain provenance. However, technical mechanisms alone do not determine whether an organization achieves durable supply chain integrity. Organizational capability—the policies, processes, tooling, and governance structures that govern how provenance is documented, how signatures are applied, and how attestation is maintained across the model lifecycle—determines whether those mechanisms are consistently and correctly applied. Organizations at different stages of AI adoption and cryptographic maturity will implement the framework at different levels of completeness, and they require a structured method for assessing their current posture, identifying gaps, and developing a prioritized improvement roadmap. This section introduces the Supply Chain Assurance Maturity Model (SCAMM): a five-level framework that enables repeatable, evidence-based assessment of AI supply chain security posture aligned with PQC transition requirements and Zero Trust principles. SCAMM is grounded in the four requirement classes derived in Section 4.4—provenance completeness, cryptographic integrity, pipeline attestation, and lifecycle governance—and is operationalized through measurable indicators that correspond directly to the schema components defined in Section 5 and the pipeline stages defined in Section 6. Each maturity level builds cumulatively on the preceding one, enabling organizations to confirm that foundational controls are in place before advancing to higher-assurance postures. The model is designed to function both as a standalone assessment instrument and as an input to broader governance activities, including Authorization to Operate (ATO) packages, Zero Trust architecture implementation plans, and CNSA 2.0 compliance roadmaps.

7.1. SCAMM Overview

The Supply Chain Assurance Maturity Model (SCAMM) defines five cumulative maturity levels that enable organizations to assess their current AI supply chain security posture, identify gaps relative to PQC transition requirements, and develop a structured improvement roadmap. Each level builds on the preceding one, reflecting increasing cryptographic assurance, provenance coverage, and governance integration. SCAMM is grounded in the requirements derived in Section 4.4 and is operationalized through the four assessment dimensions described in Section 7.3: provenance completeness, cryptographic integrity, pipeline attestation, and lifecycle governance (Figure 10).
Figure 10. Illustrative SCAMM assessment dashboard from the worked example in §7.3.5. The displayed scores correspond to D_prov = 0.95, D_crypto = 0.92, D_attest = 0.88, D_gov = 0.93, yielding an arithmetic-mean aggregate of 92% and a weakest-link maturity placement at Level 4 with a Level-5-blocking weakness in pipeline attestation per Table 5 and Table 6 (§7.3.5). The dashboard visualization is a proposed reference workflow for organizational reporting; the displayed indicator framing aligns with the four assessment dimensions defined in §7.3.1–§7.3.4. Note: signing and provenance requirements within the SCAMM model are scoped to FIPS 204 (ML-DSA) and FIPS 205 (SLH-DSA); FIPS 203 (ML-KEM) addresses key encapsulation rather than digital signatures and is included in the dashboard’s PQC-coverage indicator for completeness of NIST PQC standards.
Figure 10. Illustrative SCAMM assessment dashboard from the worked example in §7.3.5. The displayed scores correspond to D_prov = 0.95, D_crypto = 0.92, D_attest = 0.88, D_gov = 0.93, yielding an arithmetic-mean aggregate of 92% and a weakest-link maturity placement at Level 4 with a Level-5-blocking weakness in pipeline attestation per Table 5 and Table 6 (§7.3.5). The dashboard visualization is a proposed reference workflow for organizational reporting; the displayed indicator framing aligns with the four assessment dimensions defined in §7.3.1–§7.3.4. Note: signing and provenance requirements within the SCAMM model are scoped to FIPS 204 (ML-DSA) and FIPS 205 (SLH-DSA); FIPS 203 (ML-KEM) addresses key encapsulation rather than digital signatures and is included in the dashboard’s PQC-coverage indicator for completeness of NIST PQC standards.
Systems 14 00593 g010
Table 5. Default sub-indicator weights for SCAMM dimension scoring. Weights sum to 1.000 within each dimension. Organizations may customize weights with documentation; sector-specific recommendations are provided in §7.3.5.
Table 5. Default sub-indicator weights for SCAMM dimension scoring. Weights sum to 1.000 within each dimension. Organizations may customize weights with documentation; sector-specific recommendations are provided in §7.3.5.
DimensionSub-IndicatorDefault Weight
D_prov (Provenance Completeness)Model metadata coverage0.20
Pre-training dataset lineage coverage0.30
Pre-trained model dependency coverage0.20
Fine-tuning artifact coverage0.20
Deployment packaging dependency coverage0.10
D_crypto (Cryptographic Integrity)Proportion of artifacts with PQC-safe signatures0.40
Proportion with hybrid signature bundles0.20
Certificate-chain validity rate0.20
Cryptographic agility readiness score0.20
D_attest (Pipeline Attestation)Build attestation coverage0.40
Training pipeline attestation coverage0.30
Deployment and runtime attestation cadence0.30
D_gov (Lifecycle Governance)Audit trail completeness0.30
Risk analysis frequency0.20
Mitigation plan currency0.20
Zero Trust controls alignment0.30
Table 6. Per-level dimension thresholds (τ_{L,k}). An organization is placed at the highest level L for which all four dimension scores meet or exceed the corresponding row.
Table 6. Per-level dimension thresholds (τ_{L,k}). An organization is placed at the highest level L for which all four dimension scores meet or exceed the corresponding row.
Levelτ_provτ_cryptoτ_attestτ_gov
L1 (Ad Hoc)0.000.000.000.00
L2 (Documented)0.500.400.300.50
L3 (Cryptographically Verified)0.700.650.550.70
L4 (PQC-Safe)0.850.850.850.85
L5 (Continuously Attested)0.950.950.950.95

7.2. Maturity Level Definitions

Level 1: ad hoc—minimal assurance. Organizations at Level 1 lack formal AI supply chain controls. There is no standardized provenance documentation, no model or dataset signing, no verification of third-party model sources, and no attestation of training or deployment pipelines. Cryptographic mechanisms, where present, rely solely on classical signatures without PQC planning. This level reflects the current state of many organizations adopting AI rapidly without corresponding security controls, and represents the baseline from which all maturity progression begins.
Level 2: documented—foundational provenance. At Level 2, organizations begin establishing basic supply chain documentation: partial provenance records covering datasets, model versions, and dependencies; manual verification of third-party model sources; and classical signatures applied inconsistently to model artifacts. Training environment visibility is limited, and no PQC-safe mechanisms are in place, though PQC transition planning has begun. Level 2 provides foundational transparency but lacks cryptographic durability. The primary diagnostic indicator is whether provenance records exist at all—even partial, manually maintained records represent a meaningful advance over Level 1.
Level 3: cryptographically verified—classical integrity controls. At Level 3, organizations implement consistent integrity mechanisms: complete MBOM-style provenance records (without PQC extensions), classical signatures applied to all model artifacts, automated verification of model and dataset integrity, and basic pipeline attestation such as container signing and build verification. Hash selection prioritizes SHA-3 or SHAKE for alignment with FIPS 205 and design-diversity future-proofing [2,3], with the chosen hash function meeting the required security strength for the artifact class. Level 3 provides strong classical integrity but remains vulnerable to quantum-enabled forgery via HNFL attacks. Organizations at this level have the operational infrastructure needed to transition directly to Level 4 through algorithm substitution and key migration activities.
Level 4: PQC-safe—quantum-resistant integrity. At Level 4, organizations adopt PQC-safe mechanisms across the AI lifecycle: the full MBOM-PQC schema is implemented; hybrid signature bundles combining classical and FIPS 204 (ML-DSA) signatures are applied to all artifacts; PQC-safe certificate chains are deployed for model signing keys; and training and deployment pipelines produce PQC-safe attestation records. PQC-safe key management integrating FIPS 204/ML-DSA (for all artifacts, and aligned with NSS transition expectations under CNSA 2.0) and FIPS 205/SLH-DSA (for non-NSS archival artifacts under NIST FIPS 205) is built into KMS and HSM systems. Level 4is intended to keep AI artifacts verifiable throughout the PQC transition and constitutes the minimum target posture for organizations operating AI systems in national security, defense, or critical infrastructure contexts under CNSA 2.0 timelines.
Level 5: continuously attested—Zero Trust-aligned AI supply chain. At Level 5, organizations achieve continuous, end-to-end assurance: real-time verification of model integrity during deployment and inference; continuous attestation of training, deployment, and runtime environments; automated detection of provenance drift or unauthorized model updates; and full integration with Zero Trust architecture trust scoring. PQC-only signatures using FIPS 204 (ML-DSA) are applied for all operational artifacts; for non-NSS long-term archival records, FIPS 205 (SLH-DSA) provides additional hash-based integrity anchoring (note: NSS environments must use FIPS 204 (ML-DSA) in accordance with CNSA 2.0, as FIPS 205 (SLH-DSA) is not approved for NSS use). Continuous learning workflows include PQC-safe update signing and provenance extension at each update cycle. Level 5 represents a fully mature, Zero Trust-aligned AI supply chain with durable, PQC-safe integrity guarantees, and is the long-term target posture for high-assurance AI deployments in persistent threat environments.

7.3. SCAMM Indicators and Metrics

Each maturity level is evaluated using measurable indicators across four dimensions. These indicators enable repeatable, evidence-based assessment that can be reported to governance bodies and integrated into ATO packages, risk management frameworks, and supply chain security audits.

7.3.1. Provenance Completeness

Provenance completeness is measured as the percentage of artifacts with MBOM-PQC coverage across all seven schema components, supplemented by dataset lineage completeness (proportion of training datasets with signed lineage records) and upstream model dependency transparency (proportion of ingested models with verified provenance chains). These metrics directly reflect the threat requirements identified in Section 4.4.1 and provide the primary evidence base for Levels 2 through 5 assessment.

7.3.2. Cryptographic Integrity

Cryptographic integrity is measured as the percentage of artifacts signed with PQC-safe or hybrid signatures, PQC-safe certificate chain coverage (proportion of signing key chains rooted in a PQC-safe CA), and key rotation and lifecycle management compliance against documented key management policy. These indicators distinguish Level 3 (classical-only) from Level 4 (hybrid/PQC-safe) and provide the quantitative evidence required to demonstrate CNSA 2.0 alignment in federal authorization packages.

7.3.3. Pipeline Attestation

Pipeline attestation is measured across three sub-dimensions: build attestation coverage (proportion of model artifacts with hardware-rooted signing environment records), training pipeline attestation coverage (proportion of training runs with verified environment attestation), and deployment and runtime attestation frequency (cadence of post-deployment integrity re-verification). These indicators become mandatory at Level 4 and must be continuous at Level 5, reflecting the shift from point-in-time controls to persistent operational verification.

7.3.4. Lifecycle Governance

Lifecycle governance is measured through four indicators: integration with ZTA trust scoring (whether supply chain risk scores from the pipeline are consumed by ZTA policy decision points), continuous learning update verification (whether all post-deployment model updates are re-processed through the full signing and attestation pipeline), policy enforcement for third-party model ingestion (whether organizational policy gates prevent deployment of unverified externally sourced models), and automated provenance drift detection (whether the organization has tooling to detect unauthorized changes to model artifacts or provenance records between validation cycles). These indicators distinguish Level 5 organizations from Level 4 by confirming that supply chain assurance is operationally embedded, continuously enforced, and lifecycle-spanning rather than periodically audited.

7.3.5. Scoring Methodology

To make the SCAMM evaluation mathematically reproducible, this subsection specifies the scoring formula used to compute each dimension score, the aggregation rule that determines the organization’s maturity level from the four dimension scores, and the default sub-indicator weights. Organizations may customize the weights to reflect sector-specific priorities, provided the customization is documented and the aggregation rule is preserved.
Each of the four assessment dimensions—D_prov (provenance completeness, §7.3.1), D_crypto (cryptographic integrity, §7.3.2), D_attest (pipeline attestation, §7.3.3), and D_gov (lifecycle governance, §7.3.4)—is computed as a weighted sum of its sub-indicators:
D_k = Σ_j w_{k,j} · i_{k,j} for k ∈ {prov, crypto, attest, gov}
where i_{k,j} ∈ [0, 1] is the j-th sub-indicator value for dimension k (typically expressed as a proportion, such as the fraction of artifacts with verified provenance), and w_{k,j} ∈ [0, 1] is its weight, with Σ_j w_{k,j} = 1 within each dimension. Default weights are derived from the requirements-traceability mapping in §5.4 and §7.4: indicators that satisfy more requirement classes receive proportionally higher weight. Default weights are tabulated in Table 5.
The aggregate organizational maturity level uses a weakest-link rule rather than an arithmetic mean over the four dimensions, reflecting the supply chain principle that overall integrity is bounded by the weakest dimension:
L_org = max {L : ∀k, D_k ≥ τ_{L,k}}
where τ_{L,k} is the threshold for dimension k at maturity level L. The thresholds are tabulated in Table 6. The weakest-link rule prevents a single strong dimension (for example, excellent provenance documentation) from masking a weakness in another dimension (for example, missing pipeline attestation).
Worked example. The illustrative dashboard in Figure 10 reports an aggregate score of 92%. Under the scoring methodology specified above, this score is the arithmetic mean of D_prov = 0.95, D_crypto = 0.92, D_attest = 0.88, D_gov = 0.93. Applying the weakest-link rule with the Table 6 thresholds: at Level 4, the per-dimension thresholds are τ_4 = (0.85, 0.85, 0.85, 0.85), all of which the four scores exceed; at Level 5, the thresholds tighten to τ_5 = (0.95, 0.95, 0.95, 0.95), and D_attest = 0.88 falls below the Level-5 attestation threshold. The organization is therefore placed at SCAMM Level 4 with a Level-5-blocking weakness identified in pipeline attestation, which is precisely the remediation guidance the dashboard would generate. The worked example illustrates how the scoring methodology produces both an aggregate score and an actionable remediation pointer.

7.4. Requirements-to-Maturity Mapping

SCAMM directly reflects requirements derived from the threat and dependency analysis in Section 4. Table 7 maps each key requirement to its corresponding maturity levels and provides the derivation rationale grounding each assignment in documented threats and cryptographic dependencies.

7.5. Summary

The four assessment dimensions—provenance completeness, cryptographic integrity, pipeline attestation, and lifecycle governance—translate the technical requirements of the MBOM-PQC schema and PQC-safe signing pipeline into measurable organizational indicators. The requirements-to-maturity traceability matrix in Table 7 confirms that every SCAMM level is grounded in documented threats and cryptographic dependencies established in earlier sections. Together, Section 5, Section 6 and Section 7 form a complete, interlocking framework for AI supply chain security that is simultaneously architecturally prescriptive and organizationally actionable.

8. Discussion

The proposed MBOM-PQC schema, PQC-safe signing and attestation pipeline, and SCAMM maturity model collectively address a critical gap in current AI assurance practices: the absence of a unified, cryptographically durable framework for verifying the provenance, integrity, and trustworthiness of AI supply chains. While existing governance frameworks emphasize transparency, robustness, and ethical considerations, they do not provide the technical mechanisms required to ensure long-term integrity in the face of quantum-enabled threats. This section discusses the broader implications of the proposed framework, the challenges organizations may face during adoption, and the limitations that warrant future research.

8.1. Implications for AI Governance and Risk Management

The introduction of MBOM-PQC and the PQC-safe signing pipeline has significant implications for AI governance. First, the framework operationalizes key elements of the NIST AI RMF [1]—particularly transparency, accountability, and security—by providing a structured method for documenting and verifying model lineage. Second, the integration of PQC-safe signatures is intended to keep provenance records trustworthy throughout the expected operational lifetime of AI systems, addressing a gap not currently covered by existing AI governance standards. Third, the SCAMM maturity model provides a roadmap for organizations to align AI supply chain assurance with broader modernization efforts such as Zero Trust architecture and PQC migration. These implications extend beyond compliance. By enabling verifiable provenance and continuous attestation, the framework enhances organizational resilience against model poisoning, dependency compromise, and supply chain manipulation. It also supports mission-critical environments—such as defense, healthcare, and critical infrastructure—where long-term integrity guarantees are essential for authorization to operate and ongoing risk management.

8.2. Integration with Zero Trust Architecture and Enterprise Security

The framework aligns naturally with Zero Trust principles. ZTA requires continuous verification of users, devices, and workloads [44]; the proposed pipeline extends this requirement to AI artifacts. Provenance completeness, PQC-safe signatures, and attestation records become inputs to trust scoring, enabling dynamic policy enforcement based on the integrity and lineage of AI components. This integration is particularly important for environments where AI models influence access decisions, anomaly detection, or mission-critical automation. Moreover, the pipeline supports enterprise-wide cryptographic agility. By abstracting PQC-safe signing and certificate management into shared services, organizations can modernize AI supply chains without requiring each development team to independently implement PQC-safe mechanisms. This reduces duplication, improves consistency, and accelerates compliance with CNSA 2.0 [11] and NIST PQC transition guidance. The result is a supply chain assurance capability that scales across large, heterogeneous AI portfolios without proportional increases in implementation complexity. Industry security frameworks, including Google’s Secure AI Framework (SAIF) [55] and Microsoft’s analysis of failure modes in machine learning [54], identify analogous supply chain integrity requirements, reinforcing the broader ecosystem need for systematic provenance controls and cryptographic assurance.

8.3. Implementation Challenges

Despite its benefits, implementing the proposed framework presents several challenges that organizations must plan for explicitly.

8.3.1. Performance and Storage Overhead

PQC signatures—particularly FIPS 204 (ML-DSA) and FIPS 205 (SLH-DSA)—are significantly larger than classical signatures, increasing storage requirements for provenance records, bandwidth consumption during model distribution, and verification time during deployment and inference. ML-DSA-65 signatures are 3309 bytes (approximately 3.3 KB), compared to 64 bytes for Ed25519, as specified in FIPS 204 [2], Table 2 therein. SLH-DSA signatures range from approximately 8 KB to 50 KB depending on the parameter set [3]. While these overheads are manageable in enterprise environments with adequate storage and network capacity, they may pose challenges for constrained or tactical systems where bandwidth is limited and latency is critical. Organizations should benchmark signature verification performance against their deployment SLAs before selecting parameter sets. Quantitative analysis of the overhead across model scales is provided in §8.3.5, and migration cost considerations for the underlying hardware-root-of-trust infrastructure are addressed in §8.3.6.

8.3.2. Legacy System Compatibility

Many existing AI pipelines rely on classical cryptographic libraries, legacy certificate chains, and proprietary model formats that do not support PQC operations. Integrating PQC-safe signing requires updating build systems, modifying deployment workflows, replacing or upgrading cryptographic libraries, and ensuring backward compatibility during transition. Hybrid signature modes mitigate some compatibility challenges by allowing legacy verifiers to validate the classical signature component, but they do not eliminate the need for infrastructure updates. Organizations operating long-lived AI systems should develop explicit migration roadmaps that sequence infrastructure updates ahead of CNSA 2.0 compliance deadlines.

8.3.3. Provenance Completeness Challenges in Practice

Capturing complete provenance—particularly for pre-trained models and third-party datasets—may be difficult when upstream providers do not supply sufficient metadata or signatures. Public model repositories vary widely in provenance transparency, and many commercially available pre-trained models are distributed without signed lineage records or training environment documentation. Organizations may need to establish procurement requirements or contractual obligations specifying provenance standards as a condition of third-party model acquisition. Until ecosystem-level transparency norms mature, organizations operating at SCAMM Level 4 or above may need to generate best-effort provenance records through reverse-engineering and internal attestation of ingested models.

8.3.4. Organizational Maturity and Skill Gaps

Achieving higher SCAMM levels requires cryptographic expertise, secure pipeline engineering, governance alignment, and cross-team coordination that many organizations currently lack. AI development teams are typically focused on model performance rather than supply chain security, and cryptography teams may not have deep familiarity with ML pipeline architectures. Bridging this gap requires deliberate workforce development, cross-functional security reviews, and organizational structures that embed supply chain security requirements into AI development workflows from the outset rather than as a post-deployment retrofit.

8.3.5. Performance Overhead Across Model Scales

The MBOM-PQC overhead is bounded in absolute terms regardless of model size, because the schema and the hybrid bundle attach to the artifact rather than scaling with it. Table 8 makes this concrete by tabulating the bytes added and the verification time across five representative model scales spanning four orders of magnitude. ML-DSA cycle counts in this analysis are taken from Table 1 of the CRYSTALS-Dilithium Round 3 Specification [21], which reports median cycles for the AVX2-optimized implementation on Intel Skylake (median of 1000 executions, 32-byte message). The Round 3 specification figures are used here rather than later third-party benchmarks because they are authoritative for the algorithm as standardized in FIPS 204 and are reproducible from the public reference implementation at https://github.com/pq-crystals/dilithium (accessed on 15 January 2026). Conversion to wall-clock time uses a 3.3 GHz reference clock. SLH-DSA signature sizes are taken directly from FIPS 205 [3]. SHA-3-256 throughput for hash-cost estimation is taken at approximately 500 MB/s software (commodity x86 without SHA-3 hardware acceleration) and approximately 5 GB/s with hardware acceleration available on ARMv8 cores with the SHA3 cryptographic extension; these figures correspond to typical eBASH/SUPERCOP-class measurements for Keccak-f[1600].
Two observations follow from Table 8. First, the bytes added by MBOM-PQC are O(1) in model size: the hybrid bundle totals approximately 11.8 KB regardless of whether the underlying artifact is 50 MB or 350 GB. (The Round 3 specification ([21], Table 1) reports a slightly smaller signature size of 3293 bytes; the final FIPS 204 [2] size of 3309 bytes reflects post-Round-3 refinements and is used in this analysis.) Second, the verification time is dominated entirely by hash computation over the artifact, not by signature verification: even at 350 GB, the ML-DSA-65 verify operation contributes only 54 μs out of a cryptographic-core verification time measured in tens to hundreds of seconds, with hash computation over the artifact dominating that cost. The PQC contribution to cryptographic-core verification cost is therefore negligible at all model scales considered, and the practical bottleneck for large-artifact cryptographic-core verification is the choice of hash function and the availability of hash hardware acceleration, not the choice of post-quantum signature algorithm. End-to-end pipeline verification additionally incurs JSON-LD canonicalization, certificate path validation, MBOM-PQC schema parsing, I/O, registry/transparency-log latency, and policy-engine evaluation; these are largely model-size-independent fixed costs and are deferred for empirical characterization to the validation roadmap in §8.4.5.
For long-lived archival artifacts, FIPS 205 SLH-DSA [3] is the appropriate selection and provides hash-based security as a hedge against future cryptanalytic results against lattice-based schemes. SLH-DSA signatures are larger than ML-DSA: 7856 bytes for SLH-DSA-128s, 17,088 bytes for SLH-DSA-128f, and 49,856 bytes for the maximum-security SLH-DSA-256f parameter set (FIPS 205 Table 1). Verification is correspondingly slower, with published x86 verify-time benchmarks for SLH-DSA-128s in the low-millisecond range. The same asymptotic conclusions hold: PQC contribution to verification cost is bounded by a few milliseconds and is dominated by hash-computation cost for any artifact above approximately 100 MB. For tactical-edge deployments operating under sub-100 KB bandwidth budgets and intermittent connectivity, ML-DSA-44 [2] (signature size 2420 bytes; verify time ≈ 36 μs at 3.3 GHz from the 118,412-cycle Skylake AVX2 figure in ([21], Table 1)) is a viable selection at the cost of reduced security margin (NIST Level 2 vs. Level 3); the pipeline architecture supports parameter-set selection per artifact class.

8.3.6. Hardware Root-of-Trust Migration: Cost and Compatibility

The pipeline architecture in §6 assumes that the signing and attestation infrastructure can produce ML-DSA and SLH-DSA signatures with hardware-rooted assurance. As of the publication of this manuscript, the Trusted Computing Group is integrating ML-DSA support into the PC Client TPM Profile (2025 draft revision) [41], but the installed base of fielded TPM 2.0 hardware does not yet provide native FIPS 204 or FIPS 205 capabilities; firmware-level extensions, vendor-specific commands, or planned hardware refresh during the procurement transition are required. The HSM landscape is similarly transitional: a subset of FIPS 140-3 module vendors have published PQC roadmaps, but field deployment of natively PQC-capable HSMs lags the publication of the underlying NIST standards. Organizations operating long-lived AI systems may therefore face hardware-refresh costs, firmware-update requirements, or both as a precondition for reaching SCAMM Level 4. This subsection identifies three transition strategies and tabulates their relative cost characteristics in Table 9.
Software-rooted attestation. PQC signing is performed in a software-isolated enclave (e.g., a memory-protected process bound to a verified-boot chain rooted in the existing classical TPM). The attestation report covers the verified-boot state of the host but the PQC keys are software-managed. This strategy avoids hardware refresh entirely and is appropriate as an interim measure for organizations whose existing TPM 2.0 infrastructure is recent enough to support attested launch but does not natively perform PQC operations.
Hybrid-bundle bridging. Hardware-rooted signing is performed using classical algorithms (RSA, ECDSA) supported by the existing HSM; the PQC half of the hybrid bundle is performed in software and bound to the classical signature by the hybrid construction. This strategy preserves hardware-rooted assurance for the classical leg of the hybrid bundle while introducing PQC durability for the post-quantum leg, and remains valid through the CNSA 2.0 transition window during which classical-only signing continues to be acceptable for non-NSS use. After the CNSA 2.0 sunset of classical-only signing for relevant use cases (currently scheduled for the 2031 horizon), the strategy must transition to native PQC HSMs.
Phased hardware refresh. PQC-capable HSMs and TPMs are deployed in line with the organization’s existing hardware lifecycle, prioritizing the highest-criticality signing infrastructure first. Cost is amortized across the planned refresh cycle rather than incurred as an out-of-cycle capital expenditure. This strategy aligns hardware modernization with PQC migration but requires the longest timeline to full deployment.
The framework treats hardware-root-of-trust upgrade as a configurable maturity dimension rather than a Day-1 prerequisite. Organizations may advance through SCAMM Levels 1–3 using software-rooted attestation, transition to hybrid-bundle bridging at Level 4, and complete the migration to native PQC HSMs at Level 5 or as the CNSA 2.0 timeline requires. The cost matrix is qualitative because per-vendor pricing, organizational scale, and existing inventory varies substantially; the matrix is intended to support migration planning rather than to predict specific budget figures.

8.4. Limitations of the Proposed Framework

The framework has several limitations that constrain its current scope and warrant future research.

8.4.1. Evolving PQC Standards

PQC algorithms and certificate formats continue to evolve. While ML-DSA (FIPS 204) [2], SLH-DSA (FIPS 205) [3], and ML-KEM (FIPS 203) [22] are standardized, additional algorithms may be introduced, and performance optimizations may change implementation guidance. IETF drafts for hybrid key exchange [31,32], PQC certificate profiles, and composite signature formats are still in progress. Because Internet-Drafts are work-in-progress artifacts that may be revised or obsoleted, they are not used here as primary normative authority for hybrid-signature architecture. Instead, they inform the operational discussion of PQC transition pathways and hybrid transport negotiation. Specific implementation choices made today may require revision as standards mature. The framework is designed to be algorithm-agnostic at the architectural level, but specific parameter set recommendations should be reviewed against current NIST and IETF guidance at the time of implementation.

8.4.2. Lack of Empirical Validation

The framework is prescriptive and architecture-driven. While grounded in systematic evidence synthesis from 54 sources, it has not yet been validated through large-scale operational deployments. Future work should evaluate performance impacts of PQC signing in real-world AI pipelines, usability of the MBOM-PQC schema across diverse model formats and development toolchains, integration with commercial AI platforms and model registries, and the effectiveness of the pipeline in detecting supply chain compromise in controlled red-team environments. Empirical validation will be essential for establishing the framework as an operational standard rather than a theoretical contribution.

8.4.3. Dependency on Upstream Transparency

The framework assumes that upstream model providers, dataset curators, and library maintainers supply sufficient metadata and signatures to populate MBOM-PQC records. In practice, transparency varies widely across providers, and many commercially distributed models lack the provenance documentation necessary to achieve SCAMM Level 3 or above without supplementation. Adoption may require ecosystem-level incentives, regulatory requirements mandating provenance disclosure for AI artifacts used in regulated sectors, or the development of community-maintained provenance registries analogous to existing software vulnerability databases. Without broader ecosystem participation, the framework’s effectiveness will be bounded by the provenance quality of the most opaque components in the supply chain.

8.4.4. Continuous-Learning Open Questions

The operational modes for continuous-learning deployments are specified in §6.5. Three open research questions remain. First, the formal verification of delta-sign correctness—that is, the conditions under which the integrity guarantee provided by signing the weight delta against a prior signed checkpoint is equivalent to the integrity guarantee that would be provided by signing the full updated artifact—has not been treated rigorously in the published cryptographic literature for the AI-checkpoint case. Second, bounded-staleness guarantees for the batched-checkpoint mode require a specification of the maximum acceptable delay between an integrity-relevant event (a data-poisoning attempt, a model-tampering attempt) and its detection at the next signed checkpoint; the appropriate bound depends on the deployment criticality and is not yet codified. Third, the interaction between continuous-learning mode and SCAMM maturity level deserves explicit treatment: an organization at SCAMM Level 5 (“Continuously Attested”) operating a high-frequency online-learning system needs guidance on how the continuous-attestation requirement maps onto the batched-checkpoint mode, and whether such mapping admits a Level-5 placement at all. These three questions together form a coherent agenda for follow-on research.

8.4.5. Empirical Validation Roadmap

The artifacts proposed in this manuscript are design-science constructions and have not yet been empirically validated. A revised version of this work, and follow-on publications, will pursue empirical validation along three coordinated tracks. Track 1: Proof-of-concept implementation. A reference implementation of the five-stage signing and attestation pipeline (§6.1) targeting the ML-DSA-65 and SLH-DSA-128s parameter sets, instrumented with liboqs and OpenSSL 3.x with PQC providers, will be evaluated against the transformer-class model classes tabulated in §8.3.5. Reported metrics will include signing latency, verification latency, attestation round-trip time, and MBOM-PQC payload size, with comparison against the analytical bounds in §8.3.5. Track 2: Schema-coverage evaluation. The MBOM-PQC schema will be applied to a sample of publicly available pre-trained model artifacts spanning three model classes (encoder-only, decoder-only LLM, vision foundation model) and three distribution channels (Hugging Face Hub, GitHub Releases, vendor model registries) to evaluate schema-population coverage and identify the upstream-transparency gaps that require ecosystem-level remediation. Track 3: SCAMM Delphi-style expert evaluation. A multi-round Delphi study with practitioners from defense, healthcare, and regulated commercial sectors will evaluate the SCAMM dimension definitions, default weights (Table 5), and per-level thresholds (Table 6) for face validity, sectoral applicability, and inter-rater reliability. The Delphi protocol will be specified in a separate methodological paper. The three tracks together will move the framework from a design-science contribution to an operationally validated standard.

8.5. Critical Considerations and Boundary Conditions

The discussion to this point has emphasized obstacles to adopting the proposed framework. A complete critical assessment also requires examining whether parts of the framework may be over-engineered for some deployment classes, whether adoption is contingent on ecosystem conditions that may not materialize, and how the framework would manifest differently across plausible operational scenarios. This subsection addresses each in turn.

8.5.1. Where MBOM-PQC May Be Over-Engineered

The full schema and pipeline target high-assurance environments—defense, healthcare, regulated financial services, critical infrastructure—where AI artifacts have multi-year operational lifetimes and where the cost of integrity failure is high. Several deployment classes lie outside this assurance envelope and may not warrant the full framework. Short-lived models in non-regulated settings (consumer-facing recommendation systems retired within a 12-month window, internal-only research artifacts with no production deployment) may not require PQC-safe signing because the operational lifetime expires before HNFL becomes a credible threat; for these cases, the schema’s classical-signature-only mode (a hybrid bundle without the PQC leg) provides documentation value without the full cryptographic apparatus. Pre-deployment research artifacts (training-loop checkpoints, intermediate fine-tuning states) may be adequately covered by lightweight provenance (components C1, C2, C5 of the schema only) without the full seven-component record. The framework’s modularity supports these reduced configurations, and §7.2’s Level-2 (“Documented”) definition explicitly accommodates organizations whose risk profile does not justify higher levels.

8.5.2. Ecosystem Conditions That May Not Materialize

Several adoption pathways depend on ecosystem-level developments that are uncertain. First, upstream provenance disclosure norms: many publicly distributed pre-trained models lack signed lineage records or training-environment documentation, and adopting organizations are dependent on upstream providers to populate components C2, C3, and C5 of the schema. Without procurement-driven incentives or regulatory mandates, ecosystem-wide provenance disclosure may not emerge at the scale required for the framework to be broadly applicable. Second, PQC-capable hardware-root-of-trust availability: as discussed in §8.3.6, native PQC support in TPMs and HSMs is currently lagging the standardization of the underlying algorithms; if this gap persists, organizations will be forced into the software-rooted-attestation strategy as a long-term posture rather than as an interim measure, with reduced assurance properties. Third, regulator-driven adoption pressure: the framework’s value at SCAMM Levels 4 and 5 depends on regulatory or contractual pressure that justifies the implementation cost. If regulatory pressure emerges only in narrow sectors (defense, perhaps healthcare), adoption beyond those sectors may be slower than the threat-landscape analysis in §4 would warrant. The framework remains useful in each of these conditional cases—but its impact is bounded by the ecosystem conditions rather than by its internal coherence alone.

8.5.3. Illustrative Scenarios

Two illustrative scenarios—neither empirically grounded, both intended as design-time aids for organizations applying SCAMM—show how the framework would manifest differently across plausible deployment contexts.
Scenario A: Defense-mission AI deployment. A federal program office deploys a fine-tuned vision-language model to a tactical edge environment. Operational lifetime is bounded by the deployment cycle (≈5 years). The classification regime requires verifiable provenance and supply chain integrity. The CNSA 2.0 timeline applies. Under SCAMM, this organization targets Level 4 (PQC-Safe) at deployment with a Level-5 (Continuously Attested) target by the end of the deployment cycle. Schema components C1–C7 are fully populated; the pipeline operates in full re-sign mode (per §6.5) with daily attestation refresh; HRoT migration is on the phased-hardware-refresh strategy of §8.3.6. The full framework applies.
Scenario B: Commercial generative-AI service. A consumer-facing software vendor distributes a fine-tuned LLM for use in a hosted productivity service. Operational lifetime per model version is short (≈6 months between major version increments). Regulatory pressure is limited to the OWASP-style and ISO/IEC 42001 governance categories. Under SCAMM, this organization targets Level 2 (Documented) initially, with Level 3 (Cryptographically Verified) targeted within an 18-month modernization horizon. Schema components C1, C2, C3, and C7 are fully populated; C4 and C5 are partially populated with best-effort metadata; C6 is fully populated through the existing CI/CD pipeline. Signing uses classical algorithms initially, transitioning to hybrid bundles via the bridging strategy of §8.3.6 ahead of the broader CNSA 2.0 sunset. The framework applies in a reduced configuration appropriate to the assurance requirement.

8.6. Opportunities for Future Research

The framework opens several avenues for future research. Automated provenance extraction tools could reduce the manual effort required to populate MBOM-PQC records from legacy or third-party artifacts. PQC-safe model registries and distribution protocols could establish community infrastructure for signed model hosting analogous to package repositories in software development. Integration with confidential computing and secure enclaves could extend attestation guarantees to model execution environments, not just signing environments. AI-specific certificate profiles for PQC-safe signing could standardize how FIPS 204 and FIPS 205 keys are bound to organizational identities in AI supply chain contexts. Empirical validation of certificate-chain interoperability across heterogeneous PKI environments and end-to-end attestation workflow performance would provide the operational evidence needed to transition the framework from architectural prescription to deployment-ready standard. Formal verification of provenance completeness could provide mathematical guarantees that a given MBOM-PQC record captures all material influences on model behavior. Finally, systematic benchmarking of PQC signature performance across representative AI pipeline configurations would provide the empirical data needed to finalize parameter set recommendations and validate the framework’s practical applicability at scale.

8.7. Summary

The proposed framework provides a comprehensive, cryptographically anchored approach to AI supply chain security. By integrating PQC-safe signatures, hybrid modes, provenance modeling, and continuous attestation, it addresses critical gaps in current AI assurance practices that existing governance frameworks—including the NIST AI RMF [1], NIST SSDF [10], and DoD CDAO Responsible AI Toolkit [26]—do not fill. Implementation challenges around performance overhead, legacy compatibility, provenance completeness, and organizational maturity are real but tractable; the SCAMM framework provides a structured path for navigating them incrementally. Limitations around empirical validation, evolving standards, upstream transparency, and continuous learning complexity identify a productive research agenda that can be pursued in parallel with practitioner adoption. The framework offers a practical and theoretically grounded path toward durable, Zero Trust-aligned AI supply chain integrity—an essential requirement as organizations across defense, healthcare, critical infrastructure, and enterprise sectors prepare for the post-quantum era.

9. Conclusions

The growing dependence of AI systems on multi-stage supply chains—pre-trained foundation models, third-party datasets, open-source libraries, and automated training and deployment pipelines—has created a class of integrity vulnerabilities that existing AI governance and software supply chain frameworks do not fully address. The transition to post-quantum cryptography compounds this gap: classical digital signatures used to attest AI artifact integrity will not provide durable assurance over the operational lifetimes typical of AI deployments in defense, healthcare, transportation, and critical infrastructure. The harvest-now-forge-later pattern proposed in §1 makes the temporal mismatch explicit.
This manuscript proposes three integrated design-science artifacts as a structured response to the gap. The MBOM-PQC schema provides a seven-component provenance model for AI artifacts. The PQC-safe signing and attestation pipeline operationalizes the schema by integrating FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA), hybrid signature modes, and hardware-rooted attestation across a five-stage workflow with explicit branching for continuous-learning deployments (§6.5). The SCAMM maturity model supports repeatable organizational assessment with a formal scoring methodology (§7.3.5) and explicit alignment to Zero Trust and CNSA 2.0 timelines.
The contributions are prescriptive rather than empirically demonstrated. The framework is grounded in a structured evidence synthesis (54 sources, traceable via the requirements-to-architecture matrices in §5.4, §7.4) and is internally consistent; it has not yet been validated through proof-of-concept implementation, performance benchmarking against real AI pipelines, or expert evaluation. Section 8.4.5 specifies the empirical validation roadmap that constitutes immediate follow-on work. Section 8.5 acknowledges the boundary conditions—ecosystem-level provenance disclosure norms, PQC-capable hardware-root-of-trust availability, regulator-driven adoption pressure—under which the framework’s practical impact is realized.
Within those boundary conditions, the framework offers a structured approach to AI supply chain assurance that connects provenance, cryptographic durability, and organizational maturity into a single auditable architecture. As AI systems are increasingly embedded in mission-critical environments and as the post-quantum transition advances along the timelines specified by NSA CNSA 2.0 [11] and OMB M-23-02 [12], the case for cryptographically durable AI provenance grows stronger. The framework presented here is offered as a foundation for that work, contingent on the validation activities identified in §8.4.5.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/systems14050593/s1, the Supplementary Materials include the complete 54-source PRISMA-screened evidence bibliography with tier assignments, the full extraction matrix, exclusion ledger, confidence-tier summary, and the worked MBOM-PQC JSON-LD instantiation for the 110M-parameter transformer example in §6.2.5.

Funding

This research received no external funding.

Data Availability Statement

No new primary data were created or analyzed in this study. The evidence synthesis draws from publicly available policy documents, standards publications, peer-reviewed literature, and documented incident records. A selected subset of sources is cited directly in the manuscript to support specific claims, while the complete evidence set is provided in the Supplementary Materials. All 60 references—comprising the 54 PRISMA-screened sources plus six revision-time additions [21,28,29,41,42,43] added during revision—are listed in the References Section per MDPI citation requirements.

Acknowledgments

The author thanks the anonymous peer reviewers whose constructive feedback substantially improved this manuscript.

Conflicts of Interest

The author declares no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AIArtificial Intelligence
APAnalytical Proposition
ATOAuthorization to Operate
AVX2Advanced Vector Extensions 2
CNSACommercial National Security Algorithm Suite
CSFCybersecurity Framework
CVECommon Vulnerabilities and Exposures
ECDSAElliptic Curve Digital Signature Algorithm
FIPSFederal Information Processing Standards
HNDLHarvest-Now, Decrypt-Later
HNFLHarvest-Now, Forge-Later
HRoTHardware Root of Trust
HSMHardware Security Module
IETFInternet Engineering Task Force
ISO/IECInternational Organization for Standardization/International Electrotechnical Commission
MBOMModel Bill of Materials
ML-DSAModule-Lattice-Based Digital Signature Algorithm
ML-KEMModule-Lattice-Based Key-Encapsulation Mechanism
NISTNational Institute of Standards and Technology
NSANational Security Agency
NSSNational Security System
OMBOffice of Management and Budget
PQCPost-Quantum Cryptography
PRISMAPreferred Reporting Items for Systematic reviews and Meta-Analyses
SBOMSoftware Bill of Materials
SCAMMSupply Chain Assurance Maturity Model
SLH-DSAStateless Hash-Based Digital Signature Algorithm
SSDFSecure Software Development Framework
TPMTrusted Platform Module
ZTAZero Trust Architecture

Appendix A. Full 54-Source Evidence Bibliography

All 54 sources included in the evidence synthesis (Section 3.5). Sources S01–S28 are cited directly in the manuscript. Sources S29–S54 informed the synthesis, analytical propositions, and architectural derivation and are documented here for transparency and traceability even when not cited directly in the main text. Tier definitions per Section 3.7.
Table A1. Directly cited sources (S01–S28).
Table A1. Directly cited sources (S01–S28).
IDTierTypeFull CitationRef.
S01APolicy/StdNIST. AI RMF 1.0; 2023.[1]
S02APolicy/StdNIST. ML-KEM (FIPS 203); 2024.[2]
S03APolicy/StdNIST. ML-DSA (FIPS 204); 2024.[3]
S04APolicy/StdNIST. SLH-DSA (FIPS 205); 2024.[4]
S05APolicy/StdNSA. CNSA 2.0; 2022.[5]
S06APolicy/StdNIST. SSDF v1.1 (SP 800-218); 2022.[6]
S07APolicy/StdNIST. SP 800-208 (XMSS/LMS); 2020.[7]
S08APolicy/StdNIST. SP 800-204D; 2024.[8]
S09BPolicy/StdDoD CDAO. RAI Toolkit; 2024.[9]
S10APolicy/StdIETF. Hybrid Key Exchange TLS 1.3; draft-16; 2026. (Work in Progress)[10]
S11APolicy/StdIETF. PQ Hybrid ECDHE-MLKEM TLS 1.3; draft-04; 2026. (Work in Progress)[11]
S12APeer-RevCarlini et al. Poisoning Web-Scale Datasets. IEEE S&P 2023.[12]
S13APeer-RevGoldblum et al. Dataset Security for ML. ACM Comput. Surv. 2024.[13]
S14APeer-RevMachado et al. Adversarial ML in Image Classification. ACM Comput. Surv. 2023.[14]
S15APeer-RevPearce et al. Model Inversion/Extraction/SC. IEEE TDSC 2024.[15]
S16APeer-RevWu et al. BackdoorBench. NeurIPS 2022.[16]
S17AIncidentReversingLabs. Malicious ML Packages PyPI; 2023.[17]
S18AIncidentPyTorch. TorchServe Advisory CVE-2023-43654; 2023.[18]
S19BIncidentCISA. SW Supply Chain Attacks; 2023.[19]
S20APeer-RevLiu et al. Model Watermarking Survey. IEEE TNNLS 2024.[20]
S21APeer-RevRieger et al. DeepSight. NDSS 2022.[21]
S22BPeer-RevKumar et al. Secure AI/ML. Microsoft 2023.[22]
S23BPolicy/StdGoogle. SAIF; 2023.[25]
S24APolicy/StdNIST. SP 800-193 (FW Resiliency); 2022.[26]
S25BIncidentRed Hat. Securing AI Models/Containers; 2025.[27]
S26APolicy/StdMITRE. ATLAS; 2024.[28]
S27APolicy/StdNIST. SP 800-207 (ZTA); 2020.[29]
S28APeer-RevPage et al. PRISMA 2020. BMJ 2021.[30]
Table A2. Synthesis-informing sources (S29–S54). These sources met the inclusion criteria and contributed to the evidence synthesis, analytical propositions, and architectural derivation but are not all cited directly in the manuscript body. They are listed here to preserve reproducibility, source traceability, and alignment with the full 54-source working set.
Table A2. Synthesis-informing sources (S29–S54). These sources met the inclusion criteria and contributed to the evidence synthesis, analytical propositions, and architectural derivation but are not all cited directly in the manuscript body. They are listed here to preserve reproducibility, source traceability, and alignment with the full 54-source working set.
IDTierTypeFull Citation
S29APolicy/StdNIST. SP 800-218A: Secure Software Dev Practices for GenAI; NIST, 2024.
S30APolicy/StdNIST. AI 600-1: AI RMF Generative AI Profile; NIST, 2024.
S31APolicy/StdNIST. SP 800-161r1: C-SCRM Practices; NIST, 2022 (updated 2024).
S32APolicy/StdNIST. Cybersecurity Framework (CSF) 2.0; NIST, 2024.
S33APolicy/StdExecutive Order 14110: Safe, Secure, and Trustworthy AI; The White House, 2023.
S34APolicy/StdNIST. SP 800-53 Rev. 5: Security and Privacy Controls; NIST, 2020.
S35APolicy/StdIETF. X.509 PKI Algorithm Identifiers for ML-DSA; RFC 9881, 2025.
S36APolicy/StdIETF. Composite ML-DSA for X.509 PKI; Internet-Draft, IETF LAMPS WG.
S37BPolicy/StdOWASP. ML Security Top 10 (ML06: Supply Chain Attacks); 2023.
S38BPolicy/StdOWASP. LLM Top 10 v2025: LLM03 Supply Chain; GenAI Security Project, 2025.
S39APolicy/StdISO/IEC 42001:2023. AI Management System Standard; ISO, 2023.
S40APolicy/StdISO/IEC 23894:2023. AI Guidance on Risk Management; ISO, 2023.
S41APolicy/StdCISA. Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default; April 2023.
S42APolicy/StdNSA/CISA. Deploying AI Systems Securely; 2024.
S43APolicy/StdNIST. SP 800-207A: ZTA Model for Cloud-Native Apps; NIST, 2023.
S44BPolicy/StdDoD. Data, Analytics, and AI Adoption Strategy; 2023.
S45APolicy/StdOMB. M-23-02: Migrating to Post-Quantum Cryptography; OMB, 2022. Implements NSM-10.
S46APolicy/StdOWASP CycloneDX/Ecma TC54. CycloneDX BOM Standard (ECMA-424); paired with v1.5 Spec, 2023.
S47APeer-RevGu et al. BadNets: Identifying Vulnerabilities in ML Supply Chain. IEEE Access 2019.
S48APeer-RevLi et al. Anti-Backdoor Learning. NeurIPS 2021.
S49APeer-RevOhm et al. Backstabber’s Knife Collection: OSS SC Attacks. DIMVA 2020.
S50APeer-RevLadisa et al. Taxonomy of Attacks on OSS Supply Chains. IEEE S&P 2023.
S51BIncidentPyTorch Foundation. Compromised PyTorch-nightly Dependency Chain, Dec 2022.
S52BIncidentHugging Face. Hub Security: Pickle Scanning, Malware Scanning, Repository Trust Controls; 2024.
S53BIncidentUltralytics. GitHub Issue #18027: Wheel 8.3.41 compromise, XMRig miner injection; Dec 2024.
S54APeer-RevZhu et al. Models Are Codes: Malicious Code Poisoning on Pre-trained Model Hubs. ACM ASE 2024.

Appendix B. Review Method Summary

This appendix summarizes the review method used to construct the 54-source evidence base supporting the manuscript’s analytical propositions, requirements synthesis, and architectural derivation. The review followed a structured evidence-synthesis approach tailored to policy, standards, peer-reviewed technical literature, and documented supply chain incidents relevant to AI supply chain security, model provenance, post-quantum cryptography transition, attestation, and maturity-model development.
The review scope was defined by four analytical propositions (AP1–AP4) in the manuscript. Sources were screened for direct relevance to one or more of the following problem areas: (1) AI supply chain attack surfaces, vulnerabilities, or documented incidents; (2) post-quantum cryptographic mechanisms or migration constraints relevant to long-lived AI artifacts; (3) provenance, integrity, secure software development, or supply chain governance requirements; and (4) architectural, attestation, trust, or maturity-model elements transferable to quantum-resistant assurance.
The search and source-review process incorporated authoritative standards and policy materials, peer-reviewed research, and documented incident records. Broadly relevant but non-transferable sources, superseded drafts, marketing-oriented materials without verifiable methodology, and sources lacking extractable technical or normative content were excluded.
Each included source was assessed using a structured review template and assigned a source identifier (S-ID), source type, confidence tier, domain relevance, analytical-proposition linkage, and extracted requirement summary. For reviewer transparency, the Supplementary Materials preserve the included-source bibliography (Appendix A), the review-method summary (Appendix B), the exclusion and supersession ledger (Appendix C), the source-to-proposition/source-to-architecture mapping summary (Appendix D), the PRISMA 2020 checklist (Appendix E), and the confidence-tier assignment summary (Appendix F).
Table A3. Review scope, criteria, and evidence-based summary.
Table A3. Review scope, criteria, and evidence-based summary.
CategoryDescription
Review objectiveIdentify and synthesize evidence relevant to AI SC integrity, provenance, PQC-safe signing/attestation, and maturity assessment
Review designStructured evidence synthesis with prescriptive architectural derivation (design-oriented)
TimeframeJanuary–December 2025; targeted updates during revision where necessary
Included source classesPolicy/standards; peer-reviewed papers; documented SC incidents; implementation guidance
Core domainsAI SC security; provenance; attestation; PQC; secure software dev; ZTA; maturity assessment
Inclusion basisDirect relevance to AP1–AP4; extractable normative, technical, architectural, or incident evidence
Exclusion basisE1: No verifiable provenance; E2: no extractable content; E3: superseded; E4: not transferable
Records identified142
Duplicates removed19
Title/abstract screened123
Full-text reviewed76
Included in synthesis54
Final composition31 policy/standards; 15 peer-reviewed; 8 incidents
Directly cited28
Synthesis-informing only26
Table A4. Included-source review template (complete).
Table A4. Included-source review template (complete).
IDTypeTierDomainAPRequirementsCrypto ParamsVulns/AttacksLimitationsStatus
S01Policy/StdAAI/GovAP3AI governance; Map/Measure/Manage/GovernN/AN/ANo crypto or provenance specsCited
S02Policy/StdACrypto/PQCAP2ML-KEM parameter sets; key encapsulationML-KEM-512/768/1024N/AKEM only; not signingCited
S03Policy/StdACrypto/PQCAP2ML-DSA parameter sets; signature sizesML-DSA-44: 2420 B; -65: 3309 B; -87: 4627 BN/AEvolving param guidanceCited
S04Policy/StdACrypto/PQCAP2SLH-DSA parameter sets; hash-based sigsSLH-DSA-128s: ~7856 B; -256f: ~49,856 BN/ALarge signature sizesCited
S05Policy/StdACrypto/PQCAP2, AP4CNSA 2.0 timelines; ML-DSA for NSSML-DSA for sigs; ML-KEM for KEMN/ANSS-specific; no AI guidanceCited
S06Policy/StdASupply ChainAP3SSDF secure dev practices; SC integrityN/AN/ANo AI-specific artifactsCited
S07Policy/StdACrypto/PQCAP2XMSS/LMS stateful hash signaturesXMSS/LMS key/sig sizesState mgmt complexityStateful; not general signingCited
S08Policy/StdASupply ChainAP3, AP4DevSecOps CI/CD SC security controlsN/AN/ANo AI-specific provenanceCited
S09Policy/StdBAI/GovAP3DoD RAI ethical/operational considerationsN/AN/ANo crypto integrity guidanceCited
S10Policy/StdACrypto/PQCAP4Hybrid TLS 1.3 key exchange designHybrid KEM constructionsN/AActive I-D; WIP; key exchange onlyCited
S11Policy/StdACrypto/PQCAP4PQ Hybrid ECDHE-MLKEM for TLS 1.3ECDHE + ML-KEM hybridN/AActive I-D; WIP; key exchange onlyCited
S12Peer-RevAAI SCAP1Web-scale dataset poisoning feasibilityN/ALarge-scale poisoning demonstratedResearch environment onlyCited
S13Peer-RevAAI SCAP1Dataset security taxonomy; poisoning/backdoorN/AComprehensive attack/defense catalogSurvey scope; limited PQCCited
S14Peer-RevAAI SCAP1Adversarial ML attack/defense taxonomy; defender perspectiveN/AEvasion, poisoning, extractionImage classification focusCited
S15Peer-RevAAI SCAP1Model inversion, extraction, SC attacksN/AModel theft; SC compromiseLimited crypto focusCited
S16Peer-RevAAI SCAP1BackdoorBench: controlled backdoor evalBenchmark metrics8 backdoor attack methodsControlled env; not operationalCited
S17IncidentAAI SCAP1Malicious ML packages targeting PyPI devsN/ADependency confusion; data exfilSingle incident classCited
S18IncidentAAI SCAP1TorchServe SSRF/model loading vulnsN/ASSRF; arbitrary model loadingSingle CVECited
S19IncidentBAI SCAP1SW supply chain threat landscape overviewN/AMulti-vector SC attacksBroad scope; limited AI-specificCited
S20Peer-RevAAI SCAP1, AP3Model watermarking/provenance surveyWatermark embedding paramsProvenance tracking limitationsNo PQC considerationCited
S21Peer-RevAAI SCAP1DeepSight: backdoor detection in FLModel inspection metricsFederated backdoor injectionFederated-specificCited
S22Peer-RevBAI SCAP1, AP3Microsoft AI/ML security research & toolingN/ACounterfit; threat modelingIndustry report; not standardCited
S23Policy/StdBAI/GovAP3Google SAIF: secure AI framework principlesN/ASC integrity identifiedNo implementation specsCited
S24Policy/StdACross-cutAP4Platform firmware resiliency; HW root of trustTPM/firmware measurementN/ANot AI-specificCited
S25IncidentBAI SCAP1Securing AI models/container images in SCContainer signing; model distModel tampering during distBlog; limited depthCited
S26Policy/StdAAI SCAP1ATLAS: adversarial threat landscape for AIN/A12+ AI-specific attack techniquesEvolving taxonomyCited
S27Policy/StdACross-cutAP4Zero Trust Architecture principlesN/AN/ANo AI or PQC guidanceCited
S28Peer-RevAMethodN/APRISMA 2020 systematic review guidelinesN/AN/AGeneral methodologyCited
S29Policy/StdAAI SCAP3SSDF GenAI profile; AI-specific dev practicesN/ATraining data poisoning; model tamperingFinal NIST publicationSynth
S30Policy/StdAAI/GovAP3GenAI risk profile; 12 GAI risk categoriesN/AConfabulation; CBRN; data privacyGenAI-specific supplementSynth
S31Policy/StdASupply ChainAP3, AP4C-SCRM practices; multilevel risk mgmtN/ACounterfeit; malicious insertionNo AI-specific artifactsSynth
S32Policy/StdACross-cutAP3CSF 2.0 core functions; SC categoryN/AN/AFramework-level; no AI specificsSynth
S33Policy/StdAAI/GovAP3Federal AI safety/security mandatesN/AN/AExecutive directive; not technicalSynth
S34Policy/StdACross-cutAP4Security/privacy controls catalog; SR familyN/AN/AGeneral controls; no AI/PQCSynth
S35Policy/StdACrypto/PKIAP2, AP4X.509 ML-DSA algorithm identifiers; cert profilePQC cert encoding sizesN/APublished RFC; ML-DSA specificSynth
S36Policy/StdACrypto/PKIAP2, AP4Composite ML-DSA signature format; dual-alg certsComposite ML-DSA + ECDSAN/AActive IETF LAMPS WG draftSynth
S37Policy/StdBAI SCAP1ML SC attack taxonomy; OWASP ML Top 10N/A6 ML attack categoriesCommunity project; not standardSynth
S38Policy/StdBAI SCAP1LLM SC risks; model hub compromiseN/APoisoned models; LoRA backdoorsGenAI-focused; emergingSynth
S39Policy/StdAAI/GovAP3AI management system requirementsN/AN/ANo crypto or provenance specsSynth
S40Policy/StdAAI/GovAP3AI risk management guidanceN/AN/ANo supply chain specificsSynth
S41Policy/StdAAI SCAP3Secure-by-design principles & approachesN/AN/AGuidance-level; no implementationSynth
S42Policy/StdAAI SCAP3, AP4AI deployment security; model validationN/AModel tampering; adversarial inputsJoint NSA/CISA; authoritativeSynth
S43Policy/StdACross-cutAP4ZTA for cloud-native; trust scoringN/AN/ACloud-specific ZTA extensionSynth
S44Policy/StdBAI/GovAP3DoD AI adoption prioritiesN/AN/AStrategic; not technicalSynth
S45Policy/StdACrypto/PQCAP2, AP4Federal PQC migration mandate under NSM-10N/AN/AFederal directive; no AI artifactsSynth
S46Policy/StdASupply ChainAP3CycloneDX BOM Standard (ECMA-424); ML-BOMSBOM/ML-BOM field defsN/ALimited PQC integrationSynth
S47Peer-RevAAI SCAP1BadNets: backdoor vulnerability in ML SCN/ATrojan injection via training data2019; foundationalSynth
S48Peer-RevAAI SCAP1Anti-backdoor learning; training on poisoned dataDefense effectiveness metricsBackdoor detection/mitigationDefense-focusedSynth
S49Peer-RevASupply ChainAP1OSS SC attack taxonomy (174 packages)N/ATyposquatting; dep confusion2020; software-focusedSynth
S50Peer-RevASupply ChainAP1Comprehensive taxonomy of OSS SC attacksN/A107 attack vectors catalogedSoftware-centric; limited AISynth
S51IncidentBAI SCAP1Compromised PyTorch-nightly dep chain, Dec 2022N/ADependency confusion; data exfilSingle incident; December 2022Synth
S52IncidentBAI SCAP1HF Hub Security: pickle/malware scanningN/AUnsafe deserialization; repo compromisePlatform-specificSynth
S53IncidentBAI SCAP1Ultralytics wheel 8.3.41 compromise; XMRigN/ABuild pipeline injectionSingle incident; December 2024Synth
S54Peer-RevAAI SCAP1Malicious code poisoning on model hubsN/AModel hub code injection measuredConference paper; 2024Synth

Appendix C. Exclusion and Supersession Ledger

This appendix documents the exclusion logic used at full-text review and records supersession decisions relevant to reproducibility. Records excluded at title and abstract screening were counted but not individually cataloged. Records excluded at full-text review were coded using four exclusion codes to preserve a concise and auditable rationale for non-inclusion.
The exclusion logic prioritized evidentiary transferability to AI supply chain assurance and quantum-resistant provenance. Sources were excluded if they lacked verifiable provenance, lacked extractable technical or normative content, were superseded by newer or more authoritative versions, or were not transferable to AI supply chain integrity, provenance, signing, attestation, or cryptographic assurance.
Exclusion Codes
E1—No verifiable provenance: source lacked sufficient authorship, publication credibility, or methodological grounding.
E2—No extractable technical or normative content: source discussed the topic at a high level but did not provide usable specifications.
E3—Superseded by newer or more authoritative version: source was materially replaced by a newer standard, RFC, or survey.
E4—Not transferable to AI supply chain or cryptographic assurance: source addressed adjacent topics outside the defined scope.
Table A5. Full-text exclusion ledger.
Table A5. Full-text exclusion ledger.
Source DescriptionCodeStageRationaleSuperseded By
Generic AI ethics frameworkE4Full-textAddresses fairness/governance; not provenance, integrity, or crypto assuranceN/A
Early federated-learning privacy paperE4Full-textPrivacy-preserving computation; not SC integrity or artifact trustN/A
Pre-2020 adversarial ML study superseded by newer surveysE3Full-textFindings subsumed by more comprehensive recent reviewsS12, S14
NIST SP 800-63B (Digital Identity Guidelines)E4Full-textAuthentication/identity; not AI SC or model provenanceN/A
Preliminary AI watermarking workshop reportE2Full-textIdentifies gap; no extractable specificationsS20
AI safety benchmark (behavioral robustness only)E4Full-textBehavioral safety; not SC integrity or crypto assuranceN/A
Deprecated PQC candidate documentationE3Full-textSuperseded by finalized FIPS standardsS02, S03, S04
NIST IR 8269 (AI Bias Taxonomy)E4Full-textAlgorithmic bias; not SC or crypto assuranceN/A
Industry AI model card template (no crypto fields)E2Full-textMetadata format without integrity or provenance verificationN/A
Conference poster on ML model hashing (insufficient detail)E2Full-textPreliminary results; no extractable specsN/A
Early draft of CycloneDX AI/ML extensionE3Full-textSuperseded by CycloneDX v1.5 baseline specificationS46
Vendor whitepaper on AI security (no verifiable methodology)E1Full-textMarketing-oriented; no reproducible findingsN/A
Blog post on quantum computing timelinesE4Full-textQC progress without AI SC or crypto assuranceN/A
NIST PQC Round 3 candidate comparisonE3Full-textSuperseded by final FIPS 204/205 standardsS03, S04
AI governance checklist (no extractable normative content)E2Full-textHigh-level questions without technical specsN/A
Preprint on homomorphic encryption for MLE4Full-textComputation privacy; not SC integrity or provenanceN/A
Workshop proceedings on AI red-teaming (behavioral focus)E4Full-textBehavioral testing without SC, signing, or provenanceN/A
Vendor-specific HSM product briefE1Full-textProduct marketing without independent verificationN/A
Unpublished draft on SBOM extensions for MLE1Full-textNo peer review, publication venue, or verifiable authorshipN/A
Early IETF PQC cert-profile draftE3Full-textSuperseded by later WG outputS35
News article on SolarWinds attackE1Full-textJournalistic account; not AI SC specificN/A
Generic zero trust vendor whitepaperE2Full-textProduct claims without AI, PQC, or provenance contentS27
Table A6. Exclusion summary.
Table A6. Exclusion summary.
CodeMeaningCount
E1No verifiable provenance4
E2No extractable technical or normative content5
E3Superseded by newer or more authoritative version5
E4Not transferable to AI SC or crypto assurance8
TotalExcluded at full-text review22
Table A7. Screening count summary.
Table A7. Screening count summary.
StageCount
Records identified142
Duplicates removed19
Title/abstract screened123
Full-text reviewed76
Included in final synthesis54
Excluded at full text22
Excluded at title/abstract47

Appendix D. Source-to-Proposition and Source-to-Architecture Mapping Summary

This appendix provides a compact traceability layer linking the included-source working set to the manuscript’s analytical propositions and to the principal architectural outputs. Its purpose is to show how the included evidence base supports the major claims, derived requirements, and design elements. Traceability was maintained by assigning each source a stable S-ID and recording its relationship to one or more analytical propositions (AP1–AP4), then mapping to architectural outputs.
Table A8. Analytical-proposition traceability summary.
Table A8. Analytical-proposition traceability summary.
APDescriptionRepresentative Supporting SourcesEvidence Role
AP1AI SC attack surfaces, vulnerabilities, incidentsS12, S13, S14, S15, S16, S17, S18, S19, S25, S26, S37, S38, S47, S48, S49, S50, S51, S52, S53, S54Empirical, incident, taxonomy
AP2PQC transition disrupts long-lived AI artifact verificationS02, S03, S04, S05, S07, S10, S11, S35, S36, S45Normative and transition
AP3Existing frameworks lack complete quantum-resistant provenanceS01, S06, S08, S09, S20, S22, S23, S29, S30, S31, S32, S33, S34, S39, S40, S41, S46Governance, control, gap
AP4Unified architecture required for repeatable assuranceS05, S08, S10, S11, S24, S27, S31, S34, S35, S36, S42, S43, S44, S45Architectural, implementation
Table A9. Architecture Mapping Summary.
Table A9. Architecture Mapping Summary.
Architectural OutputDescriptionPrimary Supporting S-IDsNotes
MBOM-PQC schemaStructured provenance model for AI artifactsS01, S06, S20, S23, S29, S30, S31, S32, S34, S46, S47, S48, S49Provenance, identity, integrity metadata
PQC-safe signing pipelineSigning/verification pipeline with PQC-safe signaturesS03, S04, S05, S08, S10, S11, S24, S35, S36, S37, S38, S42, S43, S45Signing, verification, attestation, transition
Attestation/evidence bindingBinding model, environment, signer, SC evidenceS08, S24, S27, S39, S40, S42, S44, S45, S50, S51Trust propagation, deployment assurance
SCAMM maturity modelFive-level organizational maturity assessmentS01, S06, S09, S23, S27, S30, S31, S32, S33, S34, S41, S54Maturity criteria, organizational assessment
Table A10. Figure and table evidence map.
Table A10. Figure and table evidence map.
Figure/TableTitle/PurposeSupporting S-IDs
Figure 1Graphical abstract/framework overviewS01, S03, S05, S06, S20, S23, S27, S29, S31, S46, S54
Figure 2PRISMA-style flow diagramS28
Figure 3Lifecycle integrity mapS06, S20, S29, S31, S46, S47, S48
Figure 4Threat and dependency analysis mapS12–S19, S26, S37, S38
Figure 5MBOM-PQC seven-component provenance modelS01, S06, S20, S23, S29, S30, S46, S47, S48, S49
Figure 6MBOM-PQC schema for provenance dataS06, S20, S29, S31, S46, S49
Figure 7Composite PQC-safe signing pipelineS03, S04, S05, S10, S11, S35, S36, S37, S38, S43
Figure 8AI assurance architectureS24, S27, S39, S40, S42, S44, S45
Figure 9Policy enforcement schemaS08, S24, S27, S31, S39, S40, S42, S50, S51
Figure 10Illustrative SCAMM assessment dashboardS01, S06, S09, S23, S27, S30, S31, S32, S54
Table 1Requirements-to-MBOM-PQC traceability matrixS12–S19, S20, S23, S26
Table 2Requirements-to-SCAMM traceability matrixS02–S05, S08, S10, S11, S24, S35, S36

Appendix E. PRISMA 2020 Checklist

This appendix provides a structured reporting crosswalk adapted from PRISMA 2020 (Page et al., BMJ 2021; Ref. [30]) for the present policy-, standards-, and incident-based evidence synthesis. It complements, but does not replace, the included-source bibliography (Appendix A), review-method summary (Appendix B), exclusion and supersession ledger (Appendix C), and source-to-architecture traceability summary (Appendix D).
Table A11. PRISMA 2020 reporting checklist crosswalk for the present policy-, standards-, and incident-based evidence synthesis.
Table A11. PRISMA 2020 reporting checklist crosswalk for the present policy-, standards-, and incident-based evidence synthesis.
PRISMA Item#Checklist DescriptionReported In
Title1Identify report as systematic reviewTitle page
Abstract2Structured summaryAbstract
Rationale3Describe rationale in contextSection 1
Objectives4Explicit research questionsSection 3.2 (AP1–AP4)
Eligibility criteria5Inclusion/exclusion criteriaSection 3.4
Information sources6All info sources with datesSection 3.3
Search strategy7Full search strategySection 3.3
Selection process8Process of selecting sourcesSection 3.5; Figure 2
Data collection9Method of data extractionSection 3.6
Data items10Variables for extractionSection 3.6 (nine-field template)
Risk of bias11Methods for assessing biasSection 3.7 (Tiers A/B/C)
Effect measures12Effect measures usedN/A (qualitative synthesis)
Synthesis methods13aProcesses to synthesize resultsSection 3.1 and Section 3.8
Reporting bias13bAssess reporting biasesSection 3.7
Certainty13cAssess certainty of evidenceSection 3.7
Study selection16aNumbers at each stageSection 3.5: 142→19→123→76→54
Flow diagram16bPRISMA flow diagramFigure 2
Characteristics18Characteristics of included sourcesAppendix A
Risk in studies19Risk of bias per studyAppendix B (tier column)
Syntheses20aSummary of resultsSection 4, Section 5, Section 6 and Section 7 (Results)
Certainty22Certainty assessment per outcomeSection 3.7; Appendix F
Interpretation23aGeneral interpretationSection 8 (Discussion)
Limitations23bLimitations of evidence/reviewSection 8.4 and Section 8.5
Registration24aRegistration infoNot registered
Protocol24bProtocol accessSupplementary Materials
Amendments24cAmendments to protocolSection 3.3: IETF drafts updated
Funding25Financial supportFront matter: no external funding
Competing interests26Declare conflictsFront matter: no conflicts

Appendix F. Confidence-Tier Assignment Summary

This appendix summarizes the distribution of Tier A, Tier B, and Tier C source assignments used in the review. Tier definitions are applied at the source level and are reflected in the included-source bibliography and traceability summaries.
Tier A (high): 43 of 54 sources
Authoritative standards (NIST, NSA), published RFCs, mature IETF working-group drafts, peer-reviewed benchmarks, and documented incidents with forensic evidence. Support quantitative or normative claims.
Tier B (medium): 11 of 54 sources
Authoritative guidance (CISA, DoD CDAO), industry analyses with verifiable methodology. Support architectural requirements.
Tier C (low): 0 of 54 sources
Contextual reports, preliminary findings, sources identifying gaps without prescriptive detail. Used to contextualize emerging risks.
Distribution by source type:
Policy and Standards Documents: 31 sources ✔
Peer-Reviewed Academic Papers: 15 sources ✔
Documented Supply Chain Incidents: 8 sources ✔
Total: 54 sources ✔

References

  1. NIST. Artificial Intelligence Risk Management Framework (AI RMF 1.0); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2023.
  2. NIST. ML-DSA: Module-Lattice-Based Digital Signature Algorithm; FIPS 204; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
  3. NIST. SLH-DSA: Stateless Hash-Based Digital Signature Algorithm; FIPS 205; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
  4. ReversingLabs. Malicious Machine Learning Packages Targeting ML Developers in PyPI; ReversingLabs Threat Research: Boston, MA, USA, 2023. [Google Scholar]
  5. CISA. Software Supply Chain Attacks: Threat Landscape and Mitigations; Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2023.
  6. MITRE. ATLAS: Adversarial Threat Landscape for Artificial-Intelligence Systems; The MITRE Corporation: McLean, VA, USA, 2024; Available online: https://atlas.mitre.org (accessed on 15 January 2026).
  7. OWASP. Machine Learning Security Top 10: ML06—AI Supply Chain Attacks; OWASP Foundation. 2023. Available online: https://owasp.org/www-project-machine-learning-security-top-10/ (accessed on 15 January 2026).
  8. OWASP. Top 10 for Large Language Model Applications, Version 2025: LLM03—Supply Chain; OWASP GenAI Security Project. 2025. Available online: https://genai.owasp.org/ (accessed on 15 January 2026).
  9. ISO/IEC 42001:2023; Information Technology—Artificial Intelligence—Management System. International Organization for Standardization: Geneva, Switzerland, 2023.
  10. NIST. Secure Software Development Framework (SSDF), Version 1.1; SP 800-218; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022.
  11. NSA. Commercial National Security Algorithm Suite 2.0 (CNSA 2.0); National Security Agency: Fort Meade, MD, USA, 2022.
  12. OMB. Memorandum M-23-02: Migrating to Post-Quantum Cryptography; Implements National Security Memorandum 10 (NSM-10); Office of Management and Budget: Washington, DC, USA, 2022.
  13. Carlini, N.; Jagielski, M.; Choquette-Choo, C.A.; Paleka, D.; Pearce, W.; Anderson, H.; Terzis, A.; Thomas, K.; Tramèr, F. Poisoning Web-Scale Training Datasets is Practical. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP); IEEE: San Francisco, CA, USA, 2024; pp. 407–425. [Google Scholar] [CrossRef]
  14. Goldblum, M.; Tsipras, D.; Xie, C.; Chen, X.; Schwarzschild, A.; Song, D.; Mądry, A.; Li, B.; Goldstein, T. Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 45, 1563–1580. [Google Scholar] [CrossRef] [PubMed]
  15. Jiang, W.; Synovic, N.; Hyatt, M.; Schorlemmer, T.R.; Sethi, R.; Lu, Y.-H.; Thiruvathukal, G.K.; Davis, J.C. An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry. In Proceedings of the 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE); IEEE: Melbourne, Australia, 2023; pp. 2463–2475. [Google Scholar] [CrossRef]
  16. PyTorch. TorchServe Security Advisory: Server-Side Request Forgery and Model Loading Vulnerabilities (CVE-2023-43654); PyTorch Foundation: San Francisco, CA, USA, 2023. Available online: https://nvd.nist.gov/vuln/detail/CVE-2023-43654 (accessed on 15 January 2026).
  17. Ladisa, P.; Plate, H.; Martinez, M.; Barais, O. SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP); IEEE: San Francisco, CA, USA, 2023; pp. 1509–1526. [Google Scholar] [CrossRef]
  18. Li, Y.; Wang, H.; Barni, M. A Survey of Deep Neural Network Watermarking Techniques. Neurocomputing 2021, 461, 171–193. [Google Scholar] [CrossRef]
  19. Zhao, J.; Wang, S.; Zhao, Y.; Hou, X.; Wang, K.; Gao, P.; Zhang, Y.; Wei, C.; Wang, H. Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. In Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering (ASE 2024); ACM: Sacramento, CA, USA, 2024. [Google Scholar] [CrossRef]
  20. Rieger, P.; Krauß, T.; Miettinen, M.; Dmitrienko, A.; Sadeghi, A.-R. CrowdGuard: Federated Backdoor Detection in Federated Learning. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2024); Internet Society: San Diego, CA, USA, 2024. [Google Scholar] [CrossRef]
  21. Bai, S.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation (Version 3.1); NIST Post-Quantum Cryptography Standardization Round 3 Submission. 8 February 2021. Available online: https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf (accessed on 26 April 2026).
  22. NIST. ML-KEM: Module-Lattice-Based Key-Encapsulation Mechanism; FIPS 203; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
  23. NIST. Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations; SP 800-161r1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022; (updated 2024). [CrossRef]
  24. NIST. The NIST Cybersecurity Framework (CSF) 2.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
  25. NIST. SP 800-204D: Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
  26. DoD CDAO. Responsible Artificial Intelligence (RAI) Toolkit; Chief Digital and Artificial Intelligence Office: Arlington, VA, USA, 2024; Available online: https://www.ai.mil/Latest/Blog/Article-Display/Article/3940314/responsible-ai-toolkit/ (accessed on 15 January 2026).
  27. NIST. SP 800-208: Recommendation for Stateful Hash-Based Signature Schemes (XMSS and LMS); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020.
  28. Hevner, A.R.; March, S.T.; Park, J.; Ram, S. Design Science in Information Systems Research. MIS Q. 2004, 28, 75–105. [Google Scholar] [CrossRef]
  29. Peffers, K.; Tuunanen, T.; Rothenberger, M.A.; Chatterjee, S. A Design Science Research Methodology for Information Systems Research. J. Manag. Inf. Syst. 2007, 24, 45–77. [Google Scholar] [CrossRef]
  30. Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef] [PubMed]
  31. IETF. Hybrid Key Exchange in TLS 1.3; Internet-Draft draft-ietf-tls-hybrid-design-16; Internet Engineering Task Force, 2026. (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/ (accessed on 15 January 2026).
  32. IETF. Post-quantum Hybrid ECDHE-MLKEM Key Agreement for TLSv1.3; Internet-Draft draft-ietf-tls-ecdhe-mlkem-04; Internet Engineering Task Force, 2026. (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-tls-ecdhe-mlkem/ (accessed on 15 January 2026).
  33. NIST. Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile; SP 800-218A; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024. Available online: https://csrc.nist.gov/pubs/sp/800/218/a/final (accessed on 15 January 2026).
  34. NIST. Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile; AI 600-1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024.
  35. NIST. Security and Privacy Controls for Information Systems and Organizations; SP 800-53, Rev. 5; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [CrossRef]
  36. ISO/IEC 23894:2023; Information Technology—Artificial Intelligence—Guidance on Risk Management. International Organization for Standardization: Geneva, Switzerland, 2023.
  37. CISA. Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default; Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2023. Available online: https://www.cisa.gov/securebydesign (accessed on 15 January 2026).
  38. DoD. Data, Analytics, and Artificial Intelligence Adoption Strategy; Department of Defense: Washington, DC, USA, 2023.
  39. OWASP Foundation; Ecma TC54. CycloneDX Bill of Materials Standard (ECMA-424). 2023. Available online: https://cyclonedx.org/specification/overview/ (accessed on 15 January 2026).
  40. Li, Y.; Lyu, X.; Koren, N.; Lyu, L.; Li, B.; Ma, X. Anti-Backdoor Learning: Training Clean Models on Poisoned Data. In Proceedings of the 35th Conference on Neural Information Processing Systems (NeurIPS 2021); Curran Associates: Red Hook, NY, USA, 2021; pp. 14900–14912. [Google Scholar]
  41. Trusted Computing Group. PC Client Platform TPM Profile (PTP) Specification, Family 2.0; Level 00, 2025 draft revision; Trusted Computing Group: Beaverton, OR, USA, 2025; Available online: https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/ (accessed on 26 April 2026).
  42. GSA. Post-Quantum Cryptography Buyer’s Guide; U.S. General Services Administration: Washington, DC, USA, 2025. Available online: https://buy.gsa.gov/api/system/files/documents/final-508c-pqc_buyer-s_guide_2025.pdf (accessed on 26 April 2026).
  43. CISA. Product Categories for Technologies That Use Post-Quantum Cryptography Standards; published per Executive Order 14306; Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2026. Available online: https://www.cisa.gov/resources-tools/resources/product-categories-technologies-use-post-quantum-cryptography-standards (accessed on 26 April 2026).
  44. NIST. Zero Trust Architecture; SP 800-207; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020.
  45. IETF. Internet X.509 Public Key Infrastructure—Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA); RFC 9881; Internet Engineering Task Force, 2025. Available online: https://www.rfc-editor.org/rfc/rfc9881 (accessed on 15 January 2026).
  46. The White House. Executive Order 14110: Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence; National Archives and Records Administration: Washington, DC, USA, 2023.
  47. NSA; CISA. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems; National Security Agency and Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2024. Available online: https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF (accessed on 15 January 2026).
  48. Gu, T.; Dolan-Gavitt, B.; Garg, S. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. IEEE Access 2019, 7, 47230–47244. [Google Scholar] [CrossRef]
  49. Ohm, M.; Plate, H.; Sykosch, A.; Meier, M. Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020); Maurice, C., Bilge, L., Stringhini, G., Neves, N., Eds.; Lecture Notes in Computer Science 12223; Springer: Cham, Switzerland, 2020; pp. 23–43. [Google Scholar] [CrossRef]
  50. PyTorch Foundation. Compromised PyTorch-Nightly Dependency Chain Between December 25th and December 30th, 2022; PyTorch Blog. December 2022. Available online: https://pytorch.org/blog/compromised-nightly-dependency/ (accessed on 15 January 2026).
  51. Hugging Face. Hub Security Documentation: Pickle Scanning, Malware Scanning, and Repository Trust Controls. 2024. Available online: https://huggingface.co/docs/hub/en/security (accessed on 15 January 2026).
  52. Ultralytics. GitHub Issue #18027: Published Wheel 8.3.41 Contained Code Not Present in GitHub and Appeared to Invoke an XMRig Miner. December 2024. Available online: https://github.com/ultralytics/ultralytics/issues/18027 (accessed on 15 January 2026).
  53. IETF. Composite ML-DSA for Use in X.509 Public Key Infrastructure; Internet-Draft, Current IETF LAMPS Working-Group Draft. (Work in Progress). Available online: https://datatracker.ietf.org/doc/draft-ietf-lamps-pq-composite-sigs/ (accessed on 15 January 2026).
  54. Kumar, R.S.S.; O’Brien, D.; Albert, K.; Viljoen, S.; Snover, J. Failure Modes in Machine Learning; Microsoft Corporation: Redmond, WA, USA, 2019; Available online: https://learn.microsoft.com/en-us/security/engineering/failure-modes-in-machine-learning (accessed on 15 January 2026).
  55. Google. Secure AI Framework (SAIF); Google LLC: Mountain View, CA, USA, 2023; Available online: https://safety.google/cybersecurity-advancements/saif/ (accessed on 15 January 2026).
  56. Red Hat. Trusted Software Supply Chain: Platform Resiliency for AI Workloads; Red Hat: Raleigh, NC, USA, 2024; Available online: https://www.redhat.com/en/solutions/trusted-software-supply-chain (accessed on 15 January 2026).
  57. Machado, G.R.; Silva, E.; Goldschmidt, R.R. Adversarial Machine Learning in Image Classification: A Survey Toward the Defender’s Perspective. ACM Comput. Surv. 2023, 55, 1–38. [Google Scholar] [CrossRef]
  58. Wu, B.; Chen, H.; Zhang, M.; Zhu, Z.; Wei, S.; Yuan, D.; Shen, C. BackdoorBench: A Comprehensive Benchmark of Backdoor Learning. In Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS 2022) Datasets and Benchmarks Track; Curran Associates: Red Hook, NY, USA, 2022. [Google Scholar]
  59. Open Container Initiative. Image Format Specification, Version 1.1.0; OCI Working Group: San Francisco, CA, USA, 2024. Available online: https://github.com/opencontainers/image-spec (accessed on 15 January 2026).
  60. NIST. A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments; SP 800-207A; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2023.
Figure 1. PRISMA 2020 flow diagram—evidence screening and selection. Adapted for policy, standards, and security-incident synthesis [30]. The initial search identified 142 records across seven source categories (NIST CSRC, NSA.gov, CISA.gov, IEEE Xplore, ACM Digital Library, IACR ePrint, and curated incident repositories), as enumerated in Table 2. After deduplication (n = 19), 123 records underwent title and abstract screening, yielding 76 full-text articles assessed for eligibility. Twenty-two records were excluded at full-text review against four exclusion criteria: no verifiable provenance (E1), no extractable technical or normative content (E2), superseded by a newer version (E3), and not transferable to AI supply chain or cryptographic assurance contexts (E4). The final evidence base comprises 54 sources: 31 policy and standards documents, 15 peer-reviewed academic papers, and 8 documented supply chain incidents.
Figure 1. PRISMA 2020 flow diagram—evidence screening and selection. Adapted for policy, standards, and security-incident synthesis [30]. The initial search identified 142 records across seven source categories (NIST CSRC, NSA.gov, CISA.gov, IEEE Xplore, ACM Digital Library, IACR ePrint, and curated incident repositories), as enumerated in Table 2. After deduplication (n = 19), 123 records underwent title and abstract screening, yielding 76 full-text articles assessed for eligibility. Twenty-two records were excluded at full-text review against four exclusion criteria: no verifiable provenance (E1), no extractable technical or normative content (E2), superseded by a newer version (E3), and not transferable to AI supply chain or cryptographic assurance contexts (E4). The final evidence base comprises 54 sources: 31 policy and standards documents, 15 peer-reviewed academic papers, and 8 documented supply chain incidents.
Systems 14 00593 g001
Figure 2. Lifecycle integrity map for AI supply chain security. The five-stage AI lifecycle (pre-training → fine-tuning → packaging → deployment → continuous learning) with MBOM-PQC provenance capture at each stage. FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA), and hybrid signatures are applied through the proposed PQC-safe signing pipeline. The SCAMM pyramid and four assessment dimensions—provenance completeness, cryptographic integrity, pipeline attestation, and lifecycle governance—govern organizational readiness.
Figure 2. Lifecycle integrity map for AI supply chain security. The five-stage AI lifecycle (pre-training → fine-tuning → packaging → deployment → continuous learning) with MBOM-PQC provenance capture at each stage. FIPS 204 (ML-DSA), FIPS 205 (SLH-DSA), and hybrid signatures are applied through the proposed PQC-safe signing pipeline. The SCAMM pyramid and four assessment dimensions—provenance completeness, cryptographic integrity, pipeline attestation, and lifecycle governance—govern organizational readiness.
Systems 14 00593 g002
Figure 3. Threat and dependency analysis map. Seven threat vectors—data poisoning, model tampering, supply chain attack, insider threats, adversarial exploits, unverified models, and malicious inference—converge on training-time vulnerabilities (compromised datasets, backdoored models, trojanized packages, vulnerable libraries). A Zero Trust Evaluation and Decision Engine applies risk assessment, compliance checks, and policy rules, producing a dynamic risk evaluation score driving enforcement tiers (restricted/conditional/full access). All threat vectors are addressed through the proposed MBOM-PQC provenance framework and PQC-safe pipeline.
Figure 3. Threat and dependency analysis map. Seven threat vectors—data poisoning, model tampering, supply chain attack, insider threats, adversarial exploits, unverified models, and malicious inference—converge on training-time vulnerabilities (compromised datasets, backdoored models, trojanized packages, vulnerable libraries). A Zero Trust Evaluation and Decision Engine applies risk assessment, compliance checks, and policy rules, producing a dynamic risk evaluation score driving enforcement tiers (restricted/conditional/full access). All threat vectors are addressed through the proposed MBOM-PQC provenance framework and PQC-safe pipeline.
Systems 14 00593 g003
Figure 4. Proposed MBOM-PQC schema—seven-component provenance model. Seven provenance components—C1: model metadata (name, version, architecture); C2: dataset lineage (dataset IDs, source, licensing); C3: model dependencies (upstream model IDs, CVEs); C4: fine-tuning artifacts (datasets, hyperparameters, scripts); C5: training environment and pipeline (HW/SW stack, attestation records); C6: deployment packaging (container images, dependency graphs); and C7: cryptographic integrity (FIPS 204 and FIPS 205 signatures, hybrid bundles, PQC-safe certificates)—converge into the PQC-Safe provenance shield signed with FIPS 204 (ML-DSA) and FIPS 205 (SLH-DSA). The PQC-safe certificate chain anchors the entire provenance record, providing post-quantum cryptographic assurance.
Figure 4. Proposed MBOM-PQC schema—seven-component provenance model. Seven provenance components—C1: model metadata (name, version, architecture); C2: dataset lineage (dataset IDs, source, licensing); C3: model dependencies (upstream model IDs, CVEs); C4: fine-tuning artifacts (datasets, hyperparameters, scripts); C5: training environment and pipeline (HW/SW stack, attestation records); C6: deployment packaging (container images, dependency graphs); and C7: cryptographic integrity (FIPS 204 and FIPS 205 signatures, hybrid bundles, PQC-safe certificates)—converge into the PQC-Safe provenance shield signed with FIPS 204 (ML-DSA) and FIPS 205 (SLH-DSA). The PQC-safe certificate chain anchors the entire provenance record, providing post-quantum cryptographic assurance.
Systems 14 00593 g004
Figure 5. Proposed MBOM-PQC schema for provenance data. The schema captures five artifact types—dataset (hash, source, license), AI model (ML-DSA/PQC signing, FIPS 204/FIPS 205 signatures), dependencies (provenance/training source history), code and configs (library hashes, config hashes), and attestation (build tool: Bazel, build info: timestamp and ID)—with example entries and integrity notes. Continuous verification (“Attest & Verify Cryptographic Assurance”) underpins the schema, supported by risk scoring, access policies, Zero Trust controls, and audit and monitor governance functions. Note: the SHA-256 hash shown is illustrative; PQC-forward deployments should use SHA-3 or SHAKE for forward compatibility with FIPS 204 and FIPS 205 (see Section 7.2, Level 3).
Figure 5. Proposed MBOM-PQC schema for provenance data. The schema captures five artifact types—dataset (hash, source, license), AI model (ML-DSA/PQC signing, FIPS 204/FIPS 205 signatures), dependencies (provenance/training source history), code and configs (library hashes, config hashes), and attestation (build tool: Bazel, build info: timestamp and ID)—with example entries and integrity notes. Continuous verification (“Attest & Verify Cryptographic Assurance”) underpins the schema, supported by risk scoring, access policies, Zero Trust controls, and audit and monitor governance functions. Note: the SHA-256 hash shown is illustrative; PQC-forward deployments should use SHA-3 or SHAKE for forward compatibility with FIPS 204 and FIPS 205 (see Section 7.2, Level 3).
Systems 14 00593 g005
Figure 6. Proposed reference workflow: PQC-safe signing pipeline for discrete model release. Input stage (artifact, MBOM-PQC metadata, dependency hashes) feeds the signing and attestation process: hash generation → PQC signing (FIPS 204/ML-DSA for operational artifacts; FIPS 205/SLH-DSA for non-NSS archival) and classical signing (RSA) in parallel → hybrid signature bundle → attestation report → PQC-safe certificate chain. Secure outputs: signed artifact, hybrid signature bundle, attestation report, and validation data. The three visual columns map to the five pipeline stages defined in Section 6.1: input stage encompasses ingestion (Stage 1) and verification (Stage 2); the signing and attestation process encompasses signing (Stage 3) and attestation (Stage 4); secure outputs encompasses deployment (Stage 5).
Figure 6. Proposed reference workflow: PQC-safe signing pipeline for discrete model release. Input stage (artifact, MBOM-PQC metadata, dependency hashes) feeds the signing and attestation process: hash generation → PQC signing (FIPS 204/ML-DSA for operational artifacts; FIPS 205/SLH-DSA for non-NSS archival) and classical signing (RSA) in parallel → hybrid signature bundle → attestation report → PQC-safe certificate chain. Secure outputs: signed artifact, hybrid signature bundle, attestation report, and validation data. The three visual columns map to the five pipeline stages defined in Section 6.1: input stage encompasses ingestion (Stage 1) and verification (Stage 2); the signing and attestation process encompasses signing (Stage 3) and attestation (Stage 4); secure outputs encompasses deployment (Stage 5).
Systems 14 00593 g006
Figure 7. AI assurance architecture: layered view of proposed PQC-safe processing, signing, and policy enforcement. The architecture spans four tiers: input artifacts (dataset, model training, build system, code and configs, hardware environment), PQC-safe processing layer (PQC signing service with FIPS 204 and FIPS 205, key management, attestation engine, platform, and systems), hybrid signature bundle (PQC and classical signing with risk assessment, dynamic trust scoring, and SCAMM validation), and policy enforcement layer (security logging, alerting and SIEM, access policies, incident response, audit, and reporting).
Figure 7. AI assurance architecture: layered view of proposed PQC-safe processing, signing, and policy enforcement. The architecture spans four tiers: input artifacts (dataset, model training, build system, code and configs, hardware environment), PQC-safe processing layer (PQC signing service with FIPS 204 and FIPS 205, key management, attestation engine, platform, and systems), hybrid signature bundle (PQC and classical signing with risk assessment, dynamic trust scoring, and SCAMM validation), and policy enforcement layer (security logging, alerting and SIEM, access policies, incident response, audit, and reporting).
Systems 14 00593 g007
Figure 8. Proposed policy enforcement schema. Zero Trust evaluation and decision engine receives input sources (artifact, MBOM-PQC metadata, dependency hashes) and applies risk assessment, compliance checks, and policy rules. Dynamic risk evaluation (low/moderate/high) drives enforcement tiers: Tier 1 (restricted access), Tier 2 (conditional access; SCAMM L2), Tier 3 (full access; SCAMM L3/L4), and secure outputs. Audit and reporting: activity logging, alerting and SIEM, incident reports, compliance review, and audit and monitor.
Figure 8. Proposed policy enforcement schema. Zero Trust evaluation and decision engine receives input sources (artifact, MBOM-PQC metadata, dependency hashes) and applies risk assessment, compliance checks, and policy rules. Dynamic risk evaluation (low/moderate/high) drives enforcement tiers: Tier 1 (restricted access), Tier 2 (conditional access; SCAMM L2), Tier 3 (full access; SCAMM L3/L4), and secure outputs. Audit and reporting: activity logging, alerting and SIEM, incident reports, compliance review, and audit and monitor.
Systems 14 00593 g008
Figure 9. Proposed reference workflow: continuous-learning pipeline modes. Three operational modes—full re-sign, delta-sign, and batched-checkpoint—selected by a three-input decision rule on (i) update frequency, (ii) criticality tier, and (iii) weight-change magnitude. Security-critical updates and L2-norm threshold violations override the frequency-based default and force full re-sign. Each mode binds to the discrete-release pipeline of Figure 6 in a different way: full re-sign re-executes all five stages and generates a new MBOM-PQC record; delta-sign signs the weight delta plus reference to the prior checkpoint and appends a new C7 entry; batched-checkpoint signs the cumulative state at scheduled cadence (interim updates unsigned).
Figure 9. Proposed reference workflow: continuous-learning pipeline modes. Three operational modes—full re-sign, delta-sign, and batched-checkpoint—selected by a three-input decision rule on (i) update frequency, (ii) criticality tier, and (iii) weight-change magnitude. Security-critical updates and L2-norm threshold violations override the frequency-based default and force full re-sign. Each mode binds to the discrete-release pipeline of Figure 6 in a different way: full re-sign re-executes all five stages and generates a new MBOM-PQC record; delta-sign signs the weight delta plus reference to the prior checkpoint and appends a new C7 entry; batched-checkpoint signs the cumulative state at scheduled cadence (interim updates unsigned).
Systems 14 00593 g009
Table 1. Comparative analysis of MBOM-PQC against adjacent frameworks. Entries indicate the extent of coverage in each comparator: ● = covered, ◐ = partially covered, ○ = absent.
Table 1. Comparative analysis of MBOM-PQC against adjacent frameworks. Entries indicate the extent of coverage in each comparator: ● = covered, ◐ = partially covered, ○ = absent.
DimensionSPDX 3.0CycloneDX 1.6NIST SSDFNIST AI RMFNIST CSF 2.0OWASP MLOWASP GenAIMBOM-PQC
Model metadata (architecture, version)
Pre-training dataset lineage
Fine-tuning artifacts
Pre-trained model dependencies (CVE links)
Training environment attestation
Deployment packaging dependency graph
Cryptographic integrity fields
PQC-safe signing (FIPS 204/205)
Hybrid signature mode support
Lifecycle stage attestation
Organizational maturity model
Governance/policy mapping
Table 2. Database queries executed in Phase A.
Table 2. Database queries executed in Phase A.
DatabaseQuery StringDate ExecutedHitsAfter Dedup
IEEE Xplore(“AI supply chain” OR “machine learning supply chain”) AND (“provenance” OR “attestation” OR “signing”)14 January 2025; rerun 12 March 20264740
ACM Digital Library(“model signing” OR “model provenance”) AND (“integrity” OR “adversarial”)14 January 2025; rerun 12 March 20263124
IACR ePrint“post-quantum” AND (“signature size” OR “hybrid signature” OR “ML-DSA” OR “SLH-DSA”)16 January 2025; rerun 12 March 20262219
NIST CSRC“AI” OR “post-quantum” filtered to FIPS, SP 800 series, AI 600 series16 January 2025; rerun 12 March 20261414
NSA.gov“CNSA 2.0” OR “quantum-resistant” filtered to advisory and CSI publications12 January 2025; rerun 13 March 202666
CISA.gov“AI” AND (“supply chain” OR “secure by design”)17 January 2025; rerun 13 March 2026119
Curated incident repositories (PyTorch advisories, ReversingLabs, Hugging Face Hub, Ultralytics tracker)manual curation by date filter 2020–202618–20 January 2025; rerun 14 March 20261111
Total before screening 142123
Table 3. Requirements-to-MBOM-PQC-schema traceability matrix.
Table 3. Requirements-to-MBOM-PQC-schema traceability matrix.
Threat SourceRequirementMBOM-PQC Schema Component
Training-time attacks (§4.1.1)Dataset poisoning detectionC2: Pre-Training Dataset Lineage
Ingestion-time attacks (§4.1.2)Model swap preventionC3: Pre-Trained Model Dependencies
Training-time and ingestion-time threats (§4.1.1, §4.1.2)Fine-tuning tampering detectionC4: Fine-Tuning Artifacts
Pipeline compromise (§4.2.3)Pipeline integrityC5: Training Environment & Pipeline
Quantum-enabled forgery (§4.2.1)PQC-safe integrityC7: Cryptographic Integrity Fields
Multi-stage supply chain (§4.3)Lifecycle transparencyAll components (C1–C7)
C = Component number in MBOM-PQC schema. Section references correspond to the threat analysis presented in Section 4.
Table 4. Algorithm profile selection by deployment context. ML-DSA-65 is presented as the default civilian/commercial profile in this manuscript and underpins the cost analysis in §8.3.5. NSS deployments require ML-DSA-87 (NIST Level 5) per CNSA 2.0 [11]; FIPS 205 (SLH-DSA) is not currently approved for NSS use, so the NSS profile applies ML-DSA-87 to both operational signing and archival integrity. Analogous size and cost calculations apply with proportional, but bounded increases.
Table 4. Algorithm profile selection by deployment context. ML-DSA-65 is presented as the default civilian/commercial profile in this manuscript and underpins the cost analysis in §8.3.5. NSS deployments require ML-DSA-87 (NIST Level 5) per CNSA 2.0 [11]; FIPS 205 (SLH-DSA) is not currently approved for NSS use, so the NSS profile applies ML-DSA-87 to both operational signing and archival integrity. Analogous size and cost calculations apply with proportional, but bounded increases.
ProfileOperational SigningLong-Term ArchivalHashUse Context
Constrained/InternalML-DSA-44 (NIST L2)SHA-3-256 or SHAKE-256Internal-only artifacts; short-lived non-regulated commercial settings
Civilian/Commercial (default)ML-DSA-65 (NIST L3)SLH-DSA-128s (NIST L1)SHA-3-256 or SHAKE-256Federal non-NSS; regulated industries (healthcare, finance); critical infrastructure where signature-size budget permits L3
High-Assurance/non-NSSML-DSA-87 (NIST L5)SLH-DSA-256s (NIST L5)SHA-3-512 or SHAKE-256Highest-assurance non-NSS deployments; regulated industries and critical infrastructure requiring NIST Level 5 strength; SLH-DSA-256s suitable for long-term archival where hash-based forward security is desirable
NSS/CNSA 2.0ML-DSA-87 (NIST L5)ML-DSA-87 (NIST L5)SHA-3-512 or SHAKE-256National Security Systems; classified workloads; CNSA 2.0–mandated procurement (ML-DSA-87/Category 5 [11]); FIPS 205/SLH-DSA is not approved for NSS, so ML-DSA-87 covers both operational signing and archival integrity (re-signed at policy cadence)
Table 7. Requirements-to-SCAMM-maturity-level traceability matrix. Each row traces a requirement to (a) the threat class or cryptographic dependency that motivated it, (b) the evidence sources from the synthesis that support it, with confidence-tier labels per §3.7, (c) the schema component or pipeline stage that operationalizes it, and (d) the SCAMM indicator that measures it.
Table 7. Requirements-to-SCAMM-maturity-level traceability matrix. Each row traces a requirement to (a) the threat class or cryptographic dependency that motivated it, (b) the evidence sources from the synthesis that support it, with confidence-tier labels per §3.7, (c) the schema component or pipeline stage that operationalizes it, and (d) the SCAMM indicator that measures it.
#RequirementThreat/DependencyEvidence (Tier)OperationalizationSCAMM Indicator
1Pre-training dataset lineage captureTraining-time data poisoning (§4.1.1)[13] T3, [14] T3Schema C2i_{prov,2}
2Pre-trained model dependency trackingIngestion-time tampering (§4.1.2)[4] T4, [16] T4, [19] T3Schema C3i_{prov,3}
3Fine-tuning artifact provenanceFine-tuning tampering (§4.3.2)[14] T3, [57] T3Schema C4i_{prov,4}
4Training environment attestationPipeline compromise (§4.2.3)[44] T1, [47] T2Schema C5; Pipeline Stage 4i_{attest,2}
5Deployment packaging integrityDeployment-time tampering (§4.1.3)[10] T1, [47] T2Schema C6; Pipeline Stage 5i_{prov,5}
6PQC-safe signing of artifactsQuantum-enabled forgery, HNFL (§1, §4.2.1)[2] T1, [11] T2Schema C7; Pipeline Stage 3i_{crypto,1}
7Hybrid signature support during transitionBackward verifier compatibility (§5.3.1)[31] T5, [32] T5, [53] T5Schema C7; Pipeline Stage 3i_{crypto,2}
8Certificate-chain PQC-safe validationLong-term chain integrity (§5.3.2)[45] T1Schema C7; Pipeline Stage 2i_{crypto,3}
9Lifecycle attestation cadenceMulti-stage compromise (§4.3)[44] T1, [47] T2Pipeline Stages 1–5i_{attest,3}
10Continuous verificationContinuous-learning integrity (§4.3.4, §6.5)[44] T1Pipeline Stage 5; §6.5i_{attest,3}
11Audit trail and policy enforcementGovernance gap (§4.4.4)[1] T1, [23] T1, [46] T2§6.4i_{gov,1}
12Risk analysis and mitigation cadenceOperational risk drift (§4.3.4)[23] T1, [24] T1Discussion §8i_{gov,2,3}
13Zero Trust controls alignmentTrust scoring (§6.4, §8.2)[44] T1, [60] T1§6.4i_{gov,4}
Tier labels (T1–T5) refer to the evidence-confidence tiers defined in §3.7. Section references correspond to the threat and dependency analysis (Section 4), schema/pipeline sections (Section 5 and Section 6), and the new continuous-learning subsection (§6.5).
Table 8. Performance overhead across model scales for MBOM-PQC hybrid signing. ML-DSA-65 verify time computed from 179,424 cycles on Skylake AVX2 ([21], Table 1) at 3.3 GHz reference clock = 54 μs. Bundle overhead is the sum of ML-DSA-65 signature (3309 B per FIPS 204), ECDSA-P256 signature (≈71 B), hybrid PQC certificate chain (≈6.4 KB), and JSON-LD framing overhead (≈2 KB). The verify column reports cryptographic-core overhead only—SHA-3-256 hash computation over the artifact plus ML-DSA-65 signature verification—and does not include JSON-LD canonicalization, certificate path validation, MBOM-PQC schema parsing, I/O, registry/transparency-log latency, or policy-engine (ZTA) evaluation. These end-to-end pipeline costs are largely independent of model size, are bounded in absolute terms, and are deferred for empirical characterization to the validation roadmap in §8.4.5.
Table 8. Performance overhead across model scales for MBOM-PQC hybrid signing. ML-DSA-65 verify time computed from 179,424 cycles on Skylake AVX2 ([21], Table 1) at 3.3 GHz reference clock = 54 μs. Bundle overhead is the sum of ML-DSA-65 signature (3309 B per FIPS 204), ECDSA-P256 signature (≈71 B), hybrid PQC certificate chain (≈6.4 KB), and JSON-LD framing overhead (≈2 KB). The verify column reports cryptographic-core overhead only—SHA-3-256 hash computation over the artifact plus ML-DSA-65 signature verification—and does not include JSON-LD canonicalization, certificate path validation, MBOM-PQC schema parsing, I/O, registry/transparency-log latency, or policy-engine (ZTA) evaluation. These end-to-end pipeline costs are largely independent of model size, are bounded in absolute terms, and are deferred for empirical characterization to the validation roadmap in §8.4.5.
Model ClassArtifact SizeBundle OverheadRelative OverheadSHA-3-256 Hash Time (sw/hw)ML-DSA-65 Verify [21]Cryptographic-Core Verify (sw/hw)
Small Transformer (BERT-base)50 MB11.8 KB0.023%100 ms/10 ms54 μs≈100 ms/≈10 ms
Mid-tier classifier500 MB11.8 KB0.0023%1.0 s/100 ms54 μs≈1.0 s/≈100 ms
7B-parameter LLM (FP16)14 GB11.8 KB8.0 × 10−5%28 s/2.8 s54 μs≈28 s/≈2.8 s
70B-parameter LLM (FP16)140 GB11.8 KB8.0 × 10−6%280 s/28 s54 μs≈280 s/≈28 s
Frontier checkpoint (FP16)350 GB11.8 KB3.2 × 10−6%700 s/70 s54 μs≈700 s/≈70 s
Table 9. Hardware root-of-trust migration cost matrix. Cost indicators: ● = high, ◐ = medium, ○ = low. Timeline indicators: short = 0–12 months; medium = 12–36 months; long = 36+ months.
Table 9. Hardware root-of-trust migration cost matrix. Cost indicators: ● = high, ◐ = medium, ○ = low. Timeline indicators: short = 0–12 months; medium = 12–36 months; long = 36+ months.
StrategyCapital ExpenditureOperational ExpenditureTimeline to DeployPQC DurabilityHardware-Rooted Assurance
Software-rooted attestationShortFullReduced (software keys)
Hybrid-bundle bridgingShortFull (classical leg compromisable post-Q)Preserved (classical leg only)
Phased hardware refreshLongFullFull
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Campbell, R. AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance. Systems 2026, 14, 593. https://doi.org/10.3390/systems14050593

AMA Style

Campbell R. AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance. Systems. 2026; 14(5):593. https://doi.org/10.3390/systems14050593

Chicago/Turabian Style

Campbell, Robert. 2026. "AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance" Systems 14, no. 5: 593. https://doi.org/10.3390/systems14050593

APA Style

Campbell, R. (2026). AI Supply Chain Security: MBOM-PQC Provenance, PQC Attestation, and a Maturity Model for Quantum-Resistant Assurance. Systems, 14(5), 593. https://doi.org/10.3390/systems14050593

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop