TY - GEN
T1 - SoK
T2 - 12th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2023, held in conjunction with the 56th International Symposium on Microarchitecture, MICRO 2023
AU - Das, Subrata
AU - Chatterjee, Avimita
AU - Ghosh, Swaroop
N1 - Publisher Copyright:
© 2023 Association for Computing Machinery. All rights reserved.
PY - 2023/10/29
Y1 - 2023/10/29
N2 - Quantum computing, with its transformative computational potential, is gaining prominence in the technological landscape. As a new and exotic technology, quantum computers involve innumerable Intellectual Property (IP) in the form of fabrication recipe, control electronics and software techniques, to name a few. Furthermore, complexity of quantum systems necessitates extensive involvement of third party tools, equipment and services which could risk the IPs and the Quality of Service and enable other attack surfaces. This paper is a first attempt to explore the quantum computing ecosystem, from the fabrication of quantum processors to the development of specialized software tools and hardware components, from a security perspective. By investigating the publicly disclosed information from industry front runners like IBM, Google, Honeywell and more, we piece together various components of quantum computing supply chain. We also uncover some potential vulnerabilities and attack models and suggest defenses. We highlight the need to scrutinize the quantum computing supply chain further through the lens of security.
AB - Quantum computing, with its transformative computational potential, is gaining prominence in the technological landscape. As a new and exotic technology, quantum computers involve innumerable Intellectual Property (IP) in the form of fabrication recipe, control electronics and software techniques, to name a few. Furthermore, complexity of quantum systems necessitates extensive involvement of third party tools, equipment and services which could risk the IPs and the Quality of Service and enable other attack surfaces. This paper is a first attempt to explore the quantum computing ecosystem, from the fabrication of quantum processors to the development of specialized software tools and hardware components, from a security perspective. By investigating the publicly disclosed information from industry front runners like IBM, Google, Honeywell and more, we piece together various components of quantum computing supply chain. We also uncover some potential vulnerabilities and attack models and suggest defenses. We highlight the need to scrutinize the quantum computing supply chain further through the lens of security.
UR - http://www.scopus.com/inward/record.url?scp=85178997868&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85178997868&partnerID=8YFLogxK
U2 - 10.1145/3623652.3623664
DO - 10.1145/3623652.3623664
M3 - Conference contribution
AN - SCOPUS:85178997868
T3 - ACM International Conference Proceeding Series
SP - 82
EP - 90
BT - Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2023
PB - Association for Computing Machinery
Y2 - 29 October 2023
ER -