Extending and Defending Attacks on Reset Operations in Quantum Computers

09/12/2023
by   Jerry Tan, et al.
0

The development of quantum computers has been advancing rapidly in recent years. As quantum computers become more widely accessible, potentially malicious users could try to execute their code on the machines to leak information from other users, to interfere with or manipulate the results of other users, or to reverse engineer the underlying quantum computer architecture and its intellectual property, for example. Among different security threats, previous work has demonstrated information leakage across the reset operations, and it then proposed a secure reset operation could be an enabling technology that allows the sharing of a quantum computer among different users, or among different quantum programs of the same user. This work first shows a set of new, extended reset operation attacks that could be more stealthy by hiding the intention of the attacker's circuit. This work shows various masking circuits and how attackers can retrieve information from the execution of a previous shot of a circuit, even if the masking circuit is used between the reset operation (of the victim, after the shot of the circuit is executed) and the measurement (of the attacker). Based on the uncovered new possible attacks, this work proposes a set of heuristic checks that could be applied at transpile time to check for the existence of malicious circuits that try to steal information via the attack on the reset operation. Unlike run-time protection or added secure reset gates, this work proposes a complimentary, compile-time security solution to the attacks on reset operation.

READ FULL TEXT

page 1

page 8

page 9

research
03/05/2022

Towards an Antivirus for Quantum Computers

Researchers are today exploring models for cloud-based usage of quantum ...
research
04/06/2023

Exploration of Quantum Computer Power Side-Channels

Noisy Intermediate-Scale Quantum (NISQ) quantum computers are being rapi...
research
09/11/2023

Classification of Quantum Computer Fault Injection Attacks

The rapid growth of interest in quantum computing has brought about the ...
research
06/22/2022

HybridRAM: The first quantum approach for key recovery attacks on Rainbow

A rectangular MinRank attack, proposed by Ward Beullens in 2021, reduced...
research
07/05/2019

Optimization of Quantum Circuit Mapping using Gate Transformation and Commutation

This paper addresses quantum circuit mapping for Noisy Intermediate-Scal...
research
06/17/2023

Superconducting Heater Cryotron-Based Reconfigurable Logic Towards Cryogenic IC Camouflaging

Superconducting electronics are among the most promising alternatives to...
research
04/06/2023

From Social Engineering to Quantum Threats: Safeguarding User Wallets with FailSafe

While cryptocurrencies have been rapidly gaining adoption, secure wallet...

Please sign up or login with your details

Forgot password? Click here to reset