Loading web-font TeX/Main/Regular
Shuttle-Exploiting Attacks and Their Defenses in Trapped-Ion Quantum Computers | IEEE Journals & Magazine | IEEE Xplore

Shuttle-Exploiting Attacks and Their Defenses in Trapped-Ion Quantum Computers


(a) Overview of a TI system. (b) The basic concept of multi-programming. (c) Issues with single programming. (d) Attack overview: the adversary program shares a trap with...

Abstract:

Trapped-ion (TI) quantum bits are a front-runner technology for quantum computing. TI systems with multiple interconnected traps can overcome the hardware connectivity is...Show More

Abstract:

Trapped-ion (TI) quantum bits are a front-runner technology for quantum computing. TI systems with multiple interconnected traps can overcome the hardware connectivity issue inherent in superconducting qubits and can solve practical problems at scale. With a sufficient number of qubits on the horizon, the multi-programming model for Quantum Computers (QC) has been proposed where multiple users share the same QC for their computing. Multi-programming is enticing for quantum cloud providers as it can maximize device utilization, throughput, and profit for clouds. Users can also benefit from the short wait queue. However, shared access to quantum computers can create new security issues. This paper presents one such vulnerability in shared TI systems that require shuttle operations for communication among traps. Repeated shuttle operations increase quantum bit energy and degrade the reliability of computations (fidelity). We show adversarial program design approaches requiring numerous shuttles. We propose a random and systematic methodology for adversary program generation. Our analysis shows shuttle-exploiting attacks can substantially degrade the fidelities of victim programs by \approx 2 \times to \approx 63 \times . Finally, we present several countermeasures such as adopting a hybrid initial mapping policy, padding victim programs with dummy qubits, and capping maximum shuttles.
(a) Overview of a TI system. (b) The basic concept of multi-programming. (c) Issues with single programming. (d) Attack overview: the adversary program shares a trap with...
Published in: IEEE Access ( Volume: 10)
Page(s): 2686 - 2699
Date of Publication: 28 December 2021
Electronic ISSN: 2169-3536

Funding Agency:


References

References is not available for this document.