AG-2024.06-1682·cs.CR·cross-listed: quant-ph
Security Attacks Abusing Pulse-level Quantum Circuits
Authors
- Chuanqi Xu
- Jakub Szefer
Abstract
This work presents the first thorough exploration of the attacks on the interface between gate-level and pulse-level quantum circuits and pulse-level quantum circuits themselves. Typically, quantum circuits and programs that execute on quantum computers, are defined using gate-level primitives. However, to improve the expressivity of quantum circuits and to allow better optimization, pulse-level circuits are now often used. The attacks presented in this work leverage the inconsistency between the gate-level description of the custom gate, and the actual, low-level pulse implementation of this gate. By manipulating the custom gate specification, this work proposes numerous attacks: qubit plunder, qubit block, qubit reorder, timing mismatch, frequency mismatch, phase mismatch, and waveform mismatch. This work demonstrates these attacks on the real quantum computer and simulator, and shows that most current software development kits are vulnerable to these new types of attacks. In the end, this work proposes a defense framework. The exploration of security and privacy issues of the rising pulse-level quantum circuits provides insight into the future development of secure quantum software development kits and quantum computer systems.
Submitted
10 June 20241 year ago
Version
v1
License
CC-BY-4.0
DOI
10.48550/arXiv.2406.05941
Summary
Researchers reveal security vulnerabilities in quantum computers that exploit the gap between high-level quantum instructions and their low-level pulse implementations, demonstrating seven new attack types on real hardware.
- Quantum computers use two layers: gate-level (what programmers write) and pulse-level (what hardware actually executes), and attackers can exploit mismatches between them to corrupt qubits or steal information.
- Seven practical attacks are demonstrated—from blocking qubits entirely to subtly altering their frequencies and timing—showing that existing quantum software development kits lack sufficient validation between these layers.
- This work provides a defense framework and highlights that securing quantum systems requires checking the consistency between what programmers intend and what the hardware physically does.
curious · generated by claude-haiku-4-5
Chat with this PDF
Ask questions, probe assumptions, request a plain-English summary. Answers cite sections from the preprint itself.
Community
Questions and answers about this paper from other readers. No formal peer review — just a place to think out loud.