Classification of Quantum Computer Fault Injection Attacks
- URL: http://arxiv.org/abs/2309.05478v1
- Date: Mon, 11 Sep 2023 14:16:43 GMT
- Title: Classification of Quantum Computer Fault Injection Attacks
- Authors: Chuanqi Xu, Ferhat Erata, Jakub Szefer
- Abstract summary: There is a significant gap in our understanding of the vulnerabilities these computers face in terms of security and privacy attacks.
This paper presents an exploration of fault-injection attacks as one class of physical attacks on quantum computers.
By shedding light on the vulnerabilities of quantum computers to fault-injection attacks, this work contributes to the development of robust security measures for this emerging technology.
- Score: 10.353892677735212
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The rapid growth of interest in quantum computing has brought about the need
to secure these powerful machines against a range of physical attacks. As qubit
counts increase and quantum computers achieve higher levels of fidelity, their
potential to execute novel algorithms and generate sensitive intellectual
property becomes more promising. However, there is a significant gap in our
understanding of the vulnerabilities these computers face in terms of security
and privacy attacks. Among the potential threats are physical attacks,
including those orchestrated by malicious insiders within data centers where
the quantum computers are located, which could compromise the integrity of
computations and resulting data. This paper presents an exploration of
fault-injection attacks as one class of physical attacks on quantum computers.
This work first introduces a classification of fault-injection attacks and
strategies, including the domain of fault-injection attacks, the fault targets,
and fault manifestations in quantum computers. The resulting classification
highlights the potential threats that exist. By shedding light on the
vulnerabilities of quantum computers to fault-injection attacks, this work
contributes to the development of robust security measures for this emerging
technology.
Related papers
- The curse of random quantum data [62.24825255497622]
We quantify the performances of quantum machine learning in the landscape of quantum data.
We find that the training efficiency and generalization capabilities in quantum machine learning will be exponentially suppressed with the increase in qubits.
Our findings apply to both the quantum kernel method and the large-width limit of quantum neural networks.
arXiv Detail & Related papers (2024-08-19T12:18:07Z) - Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure [0.04096453902709291]
This analysis explores the impact of quantum computing on critical infrastructure and cloud services.
We advocate for proactive security strategies and collaboration between sectors to develop and implement quantum-resistant cryptography.
This blueprint strengthens each area's defenses against potential quantum-induced cyber threats.
arXiv Detail & Related papers (2024-04-16T15:36:23Z) - Quantum-Inspired Analysis of Neural Network Vulnerabilities: The Role of
Conjugate Variables in System Attacks [54.565579874913816]
Neural networks demonstrate inherent vulnerability to small, non-random perturbations, emerging as adversarial attacks.
A mathematical congruence manifests between this mechanism and the quantum physics' uncertainty principle, casting light on a hitherto unanticipated interdisciplinarity.
arXiv Detail & Related papers (2024-02-16T02:11:27Z) - Reliable AI: Does the Next Generation Require Quantum Computing? [71.84486326350338]
We show that digital hardware is inherently constrained in solving problems about optimization, deep learning, or differential equations.
In contrast, analog computing models, such as the Blum-Shub-Smale machine, exhibit the potential to surmount these limitations.
arXiv Detail & Related papers (2023-07-03T19:10:45Z) - A Primer on Security of Quantum Computing [5.510992382274774]
Quantum computing can potentially transform several application areas by solving intractable problems from classical domain.
Quantum computing stack may contain sensitive Intellectual Properties (IP) that requires protection.
Quantum computers suffer from crosstalk that couples two programs in a multi-tenant setting to facilitate traditionally known fault injection attacks.
arXiv Detail & Related papers (2023-05-04T02:30:27Z) - Exploration of Quantum Computer Power Side-Channels [6.531546527140474]
In today's cloud-based quantum computer setting, users lack physical control over the computers.
This work shows for the first time that power-based side-channel attacks could be deployed against quantum computers.
arXiv Detail & Related papers (2023-04-06T18:15:05Z) - Cybersecurity for Quantum Computing [3.867124349164785]
Quantum computing companies, institutions and research groups may become targets of nation-state actors, cybercriminals and hacktivists.
This paper discusses the status quo of quantum computing technologies and the quantum threat associated with it.
We propose recommendations on how to proactively reduce the cyberattack surface through threat intelligence and by ensuring security by design of quantum software and hardware components.
arXiv Detail & Related papers (2021-10-27T18:41:30Z) - Hardware-Efficient, Fault-Tolerant Quantum Computation with Rydberg
Atoms [55.41644538483948]
We provide the first complete characterization of sources of error in a neutral-atom quantum computer.
We develop a novel and distinctly efficient method to address the most important errors associated with the decay of atomic qubits to states outside of the computational subspace.
Our protocols can be implemented in the near-term using state-of-the-art neutral atom platforms with qubits encoded in both alkali and alkaline-earth atoms.
arXiv Detail & Related papers (2021-05-27T23:29:53Z) - Cyberattacks on Quantum Networked Computation and Communications --
Hacking the Superdense Coding Protocol on IBM's Quantum Computers [0.0]
We study two types of attacks on automated quantum communications protocols.
We show that, due to quantum entanglement and symmetries, the second type of attack works as a way to strategically disrupt quantum communications networks.
arXiv Detail & Related papers (2021-05-15T09:42:36Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - An Application of Quantum Annealing Computing to Seismic Inversion [55.41644538483948]
We apply a quantum algorithm to a D-Wave quantum annealer to solve a small scale seismic inversions problem.
The accuracy achieved by the quantum computer is at least as good as that of the classical computer.
arXiv Detail & Related papers (2020-05-06T14:18:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.