论文标题

迈向量子计算机的防病毒软件

Towards an Antivirus for Quantum Computers

论文作者

Deshpande, Sanjay, Xu, Chuanqi, Trochatos, Theodoros, Ding, Yongshan, Szefer, Jakub

论文摘要

今天,研究人员正在探索用于基于云的量子计算机使用的模型,在这些量子计算机中,多租金可用于在多个用户中共享量子计算机硬件。多租户有望更好地利用量子计算机硬件,但也可以将量子计算机打开到新型的安全攻击类型。正如这项和其他最新研究表明的那样,当受害者和攻击者电路被作为同一量子计算机上的共同租户实例化时,可以在量子计算机上使用串扰进行断层注射攻击。为了确保不会发生此类攻击,本文提出应开发新技术,以帮助捕获恶意电路,然后再将其加载到量子计算机硬件上。遵循古典计算机的想法,可以设计一种编译时间技术,以扫描量子计算机程序,以了解恶意或可疑的代码模式,然后将其编译成在量子计算机上运行的量子电路。本文介绍了正在进行的工作,这些工作表明了串扰如何影响格罗弗的算法,然后提出了如何分析量子程序的建议,以捕获与恶意意图产生大量串扰的电路。

Researchers are today exploring models for cloud-based usage of quantum computers where multi-tenancy can be used to share quantum computer hardware among multiple users. Multi-tenancy has a promise of allowing better utilization of the quantum computer hardware, but also opens up the quantum computer to new types of security attacks. As this and other recent research shows, it is possible to perform a fault injection attack using crosstalk on quantum computers when a victim and attacker circuits are instantiated as co-tenants on the same quantum computer. To ensure such attacks do not happen, this paper proposes that new techniques should be developed to help catch malicious circuits before they are loaded onto quantum computer hardware. Following ideas from classical computers, a compile-time technique can be designed to scan quantum computer programs for malicious or suspicious code patterns before they are compiled into quantum circuits that run on a quantum computer. This paper presents ongoing work which demonstrates how crosstalk can affect Grover's algorithm, and then presents suggestions of how quantum programs could be analyzed to catch circuits that generate large amounts of crosstalk with malicious intent.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源