Pulse-to-Circuit Characterization of Stealthy Crosstalk Attack on Multi-Tenant Superconducting Quantum Hardware
- URL: http://arxiv.org/abs/2509.11407v1
- Date: Sun, 14 Sep 2025 19:48:46 GMT
- Title: Pulse-to-Circuit Characterization of Stealthy Crosstalk Attack on Multi-Tenant Superconducting Quantum Hardware
- Authors: Syed Emad Uddin Shubha, Tasnuva Farheen,
- Abstract summary: Hardware crosstalk in superconducting quantum computers constitutes a significant security threat.<n>We present the first end-to-end framework for mapping physical pulse-level attacks to interpretable logical error channels.<n>We propose a protocol-level detection strategy based on observable attack signatures, showing that stealthy attacks can be exposed through targeted monitoring.
- Score: 0.14323566945483496
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Hardware crosstalk in multi-tenant superconducting quantum computers constitutes a significant security threat, enabling adversaries to inject targeted errors across tenant boundaries. We present the first end-to-end framework for mapping physical pulse-level attacks to interpretable logical error channels, integrating density-matrix simulation, quantum process tomography (QPT), and a novel isometry-based circuit extraction method. Our pipeline reconstructs the complete induced error channel and fits an effective logical circuit model, revealing a fundamentally asymmetric attack mechanism: one adversarial qubit acts as a driver to set the induced logical rotation, while a second, the catalyst, refines the attack's coherence. Demonstrated on a linear three-qubit system, our approach shows that such attacks can significantly disrupt diverse quantum protocols, sometimes reducing accuracy to random guessing, while remaining effective and stealthy even under realistic hardware parameter variations. We further propose a protocol-level detection strategy based on observable attack signatures, showing that stealthy attacks can be exposed through targeted monitoring and providing a foundation for future defense-in-depth in quantum cloud platforms.
Related papers
- TraceGuard: Process-Guided Firewall against Reasoning Backdoors in Large Language Models [19.148124494194317]
We propose TraceGuard, a process-guided security framework that transforms small-scale models into robust reasoning firewalls.<n>Our approach treats the reasoning trace as an untrusted payload and establishes a defense-in-depth strategy.<n>We demonstrate robustness against adaptive adversaries in a grey-box setting, establishing TraceGuard as a viable, low-latency security primitive.
arXiv Detail & Related papers (2026-03-02T22:19:13Z) - Quantum Attacks Targeting Nuclear Power Plants: Threat Analysis, Defense and Mitigation Strategies [1.2891210250935148]
This paper introduces a forensics-first framework for achieving quantum resilience in high-consequence environments.<n>We show how Harvest-Now, Decrypt-Later (HNDL) campaigns can retroactively compromise cryptographic foundations, undermine evidence admissibility, and facilitate sophisticated sabotage.<n>We propose and validate a phased, defense-in-depth migration path to Post-Quantum Cryptography (PQC)<n>The paper concludes that without urgent adoption of quantum-resilient controls, the integrity of both physical safety systems and digital forensic evidence remains at severe and irreversible risk.
arXiv Detail & Related papers (2026-02-25T03:26:09Z) - Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Cyber Threat Detection Enabled by Quantum Computing [7.119884090052995]
Threat detection models in cybersecurity must keep up with shifting traffic, strict feature budgets, and noisy hardware.<n>Small, near-term quantum processors are now available, but existing work rarely shows whether quantum components can improve end-to-end detection.<n>We address this gap with a hybrid architecture that uses a compact multilayer perceptron to compress security data and then routes a few features to 2-4 qubit quantum heads.
arXiv Detail & Related papers (2025-12-20T20:10:36Z) - Pulse-Level Simulation of Crosstalk Attacks on Superconducting Quantum Hardware [0.0]
Hardware crosstalk in superconducting quantum computers poses a severe security threat.<n>We present a simulation-based study of active crosstalk attacks at the pulse level.<n>We identify the pulse and coupling configurations that cause the largest logical errors.
arXiv Detail & Related papers (2025-07-22T02:52:43Z) - Fooling the Decoder: An Adversarial Attack on Quantum Error Correction [49.48516314472825]
In this work, we target a basic RL surface code decoder (DeepQ) to create the first adversarial attack on quantum error correction.<n>We demonstrate an attack that reduces the logical qubit lifetime in memory experiments by up to five orders of magnitude.<n>This attack highlights the susceptibility of machine learning-based QEC and underscores the importance of further research into robust QEC methods.
arXiv Detail & Related papers (2025-04-28T10:10:05Z) - SWAP Attack: Stealthy Side-Channel Attack on Multi-Tenant Quantum Cloud System [3.4804333771236875]
Crosstalk on shared quantum devices allows adversaries to interfere with victim circuits within a neighborhood.<n>We show that SWAP-based side-channel attack operates in both active and passive modes, as verified on real IBM quantum devices.<n>Our work highlights the urgent need for robust security measures to safeguard quantum computations against emerging threats.
arXiv Detail & Related papers (2025-02-14T12:25:08Z) - Deep-learning-based continuous attacks on quantum key distribution protocols [0.0]
In this paper, we design a new individual attack scheme that exploits continuous measurement together with the powerful pattern recognition capacities of deep recurrent neural networks.<n>Our attack increases only slightly the Quantum Bit Error Rate (QBER) of a noisy channel and allows the spy to infer a significant part of the sifted key.
arXiv Detail & Related papers (2024-08-22T17:39:26Z) - Multi-granular Adversarial Attacks against Black-box Neural Ranking Models [111.58315434849047]
We create high-quality adversarial examples by incorporating multi-granular perturbations.
We transform the multi-granular attack into a sequential decision-making process.
Our attack method surpasses prevailing baselines in both attack effectiveness and imperceptibility.
arXiv Detail & Related papers (2024-04-02T02:08:29Z) - Spatial-Frequency Discriminability for Revealing Adversarial Perturbations [53.279716307171604]
Vulnerability of deep neural networks to adversarial perturbations has been widely perceived in the computer vision community.
Current algorithms typically detect adversarial patterns through discriminative decomposition for natural and adversarial data.
We propose a discriminative detector relying on a spatial-frequency Krawtchouk decomposition.
arXiv Detail & Related papers (2023-05-18T10:18:59Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - A Self-supervised Approach for Adversarial Robustness [105.88250594033053]
Adversarial examples can cause catastrophic mistakes in Deep Neural Network (DNNs) based vision systems.
This paper proposes a self-supervised adversarial training mechanism in the input space.
It provides significant robustness against the textbfunseen adversarial attacks.
arXiv Detail & Related papers (2020-06-08T20:42:39Z) - Hardware-Encoding Grid States in a Non-Reciprocal Superconducting
Circuit [62.997667081978825]
We present a circuit design composed of a non-reciprocal device and Josephson junctions whose ground space is doubly degenerate and the ground states are approximate codewords of the Gottesman-Kitaev-Preskill (GKP) code.
We find that the circuit is naturally protected against the common noise channels in superconducting circuits, such as charge and flux noise, implying that it can be used for passive quantum error correction.
arXiv Detail & Related papers (2020-02-18T16:45:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.