Analyzing D-wave quantum macro assembler security
Document Type
Conference Proceeding
Source of Publication
Advances in Intelligent Systems and Computing
Publication Date
1-1-2019
Abstract
As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats.
DOI Link
ISBN
9783030140694
ISSN
Publisher
Springer
Volume
800 Part F1
First Page
125
Last Page
132
Disciplines
Computer Sciences | Physical Sciences and Mathematics
Scopus ID
Recommended Citation
Alsaadi, Hesham H.; Aldwairi, Monther; and Muller-Stuler, Eva Marie, "Analyzing D-wave quantum macro assembler security" (2019). All Works. 499.
https://zuscholars.zu.ac.ae/works/499
Indexed in Scopus
yes
Open Access
no