Analyzing D-wave quantum macro assembler security

Document Type

Conference Proceeding

Source of Publication

Advances in Intelligent Systems and Computing

Publication Date

1-1-2019

Abstract

As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats.

ISBN

9783030140694

ISSN

2194-5365

Publisher

Springer

Volume

800 Part F1

First Page

125

Last Page

132

Disciplines

Computer Sciences | Physical Sciences and Mathematics

Scopus ID

85090458470

Indexed in Scopus

yes

Open Access

no

Share

COinS