Analysis of crosstalk in NISQ devices and security implications in multi-programming regime

Abdullah Ash-Saki, Mahabubul Alam, Swaroop Ghosh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The noisy intermediate-scale quantum (NISQ) computers suffer from unwanted coupling across qubits referred to as crosstalk. Existing literature largely ignores the crosstalk effects which can introduce significant error in circuit optimization. In this work, we present a crosstalk modeling analysis framework for near-Term quantum computers after extracting the error-rates experimentally. Our analysis reveals that crosstalk can be of the same order of gate error which is considered a dominant error in NISQ devices. We also propose adversarial fault injection using crosstalk in a multiprogramming environment where the victim and the adversary share the same quantum hardware. Our simulation and experimental results from IBM quantum computers demonstrated that the adversary can inject fault and launch a Denial-of-Service attack. Finally, we propose system-and device-level countermeasures.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM/IEEE International Symposium on Low Power Electronics and Design, ISLPED 2020
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450370530
DOIs
StatePublished - Aug 10 2020
Event2020 ACM/IEEE International Symposium on Low Power Electronics and Design, ISLPED 2020 - Virtual, Online, United States
Duration: Aug 10 2020Aug 12 2020

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2020 ACM/IEEE International Symposium on Low Power Electronics and Design, ISLPED 2020
CountryUnited States
CityVirtual, Online
Period8/10/208/12/20

All Science Journal Classification (ASJC) codes

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint Dive into the research topics of 'Analysis of crosstalk in NISQ devices and security implications in multi-programming regime'. Together they form a unique fingerprint.

Cite this