Analyzing D-wave quantum macro assembler security
Source of Publication
Advances in Intelligent Systems and Computing
As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats.
800 Part F1
Computer Sciences | Physical Sciences and Mathematics
Alsaadi, Hesham H.; Aldwairi, Monther; and Muller-Stuler, Eva Marie, "Analyzing D-wave quantum macro assembler security" (2019). All Works. 499.
Indexed in Scopus