Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3505253.3505261acmotherconferencesArticle/Chapter ViewAbstractPublication PageshaspConference Proceedingsconference-collections
research-article
Public Access

Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers

Published: 04 June 2022 Publication History

Abstract

Fingerprinting of quantum computer devices is a new threat that poses a challenge to shared, cloud-based quantum computers. Fingerprinting can allow adversaries to map quantum computer infrastructures, uniquely identify cloud-based devices which otherwise have no public identifiers, and it can assist other adversarial attacks. This work shows idle tomography-based fingerprinting method based on crosstalk-induced errors in NISQ quantum computers. The device- and locality-specific fingerprinting results show prediction accuracy values of 99.1% and 95.3%, respectively.

References

[1]
Abdullah Ash-Saki, Mahabubul Alam, and Swaroop Ghosh. 2020. Analysis of crosstalk in NISQ devices and security implications in multi-programming regime. In International Symposium on Low Power Electronics and Design.
[2]
Robin Blume-Kohout, Erik Nielsen, Kenneth Rudinger, Kevin Young, Mohan Sarovar, and Timothy Proctor. 2019. Idle tomography: Efficient gate characterization for N-qubit processors. In APS March Meeting Abstracts.
[3]
Poulami Das, Swamit S Tannu, Prashant J Nair, and Moinuddin Qureshi. 2019. A case for multi-programming quantum computers. In International Symposium on Microarchitecture.
[4]
Jay M. Gambetta. 2020. IBM’s Roadmap For Scaling Quantum Technology. https://www.ibm.com/blogs/research/2020/09/ibm-quantum-roadmap/.
[5]
Jay M. Gambetta, Antonio D. Córcoles, Seth T. Merkel, Blake R. Johnson, John A. Smolin, Jerry M. Chow, Colm A. Ryan, Chad Rigetti, S. Poletto, Thomas A Ohki, Mark B. Ketchen, and M. Steffen. 2012. Characterization of addressability by simultaneous randomized benchmarking. Physical Review Letters 109, 24 (2012), 240504.
[6]
Jonathan A. Jones, Michele Mosca, and Rasmus H. Hansen. 1998. Implementation of a quantum search algorithm on a quantum computer. Nature 393, 6683 (1998), 344–346.
[7]
Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980 (2014).
[8]
Benjamin P. Lanyon, James D. Whitfield, Geoff G. Gillett, Michael E. Goggin, Marcelo P. Almeida, Ivan Kassal, Jacob D. Biamonte, Masoud Mohseni, Ben J. Powell, Marco Barbieri, A. Aspuru-Guzik, and A. G. White. 2010. Towards quantum chemistry on a quantum computer. Nature Chemistry 2, 2 (2010), 106–111.
[9]
N. David Mermin. 2007. Quantum computer science: an introduction. Cambridge University Press.
[10]
Erik Nielsen, Kenneth Rudinger, Timothy Proctor, Antonio Russo, Kevin Young, and Robin Blume-Kohout. 2020. Probing quantum processor performance with pyGSTi. Quantum Science and Technology 5, 4 (2020), 044002.
[11]
Koustubh Phalak, Abdullah Ash-Saki, Mahabubul Alam, Rasit Onur Topaloglu, and Swaroop Ghosh. 2021. Quantum PUF for Security and Trust in Quantum Computing. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11, 2(2021), 333–342.
[12]
John Preskill. 2018. Quantum computing in the NISQ era and beyond. Quantum 2(2018), 79.

Cited By

View all
  • (2024)Q-ID: Lightweight Quantum Network Server Identification Through FingerprintingIEEE Network10.1109/MNET.2024.340089338:5(146-152)Online publication date: Sep-2024
  • (2024)All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545404(415-419)Online publication date: 6-May-2024
  • (2023)The Imitation Game: Leveraging CopyCats for Robust Native Gate Selection in NISQ Programs2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)10.1109/HPCA56546.2023.10071025(787-801)Online publication date: Feb-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
HASP '21: Proceedings of the 10th International Workshop on Hardware and Architectural Support for Security and Privacy
October 2021
61 pages
ISBN:9781450396141
DOI:10.1145/3505253
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 June 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. device fingerprinting
  2. quantum computers

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

HASP '21

Acceptance Rates

Overall Acceptance Rate 9 of 13 submissions, 69%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)74
  • Downloads (Last 6 weeks)14
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Q-ID: Lightweight Quantum Network Server Identification Through FingerprintingIEEE Network10.1109/MNET.2024.340089338:5(146-152)Online publication date: Sep-2024
  • (2024)All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545404(415-419)Online publication date: 6-May-2024
  • (2023)The Imitation Game: Leveraging CopyCats for Robust Native Gate Selection in NISQ Programs2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)10.1109/HPCA56546.2023.10071025(787-801)Online publication date: Feb-2023
  • (2023)Design of Quantum Computer Antivirus2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55118.2023.10133711(260-270)Online publication date: 1-May-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media