Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

Abstract

The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access to power traces, attackers can recover information about the control pulses sent to quantum computers. From the control pulses, the gate level description of the circuits, and eventually the secret algorithms can be reverse engineered. This work demonstrates how and what information could be recovered. This work uses algebraic reconstruction from power traces to realize two new types of single trace attacks: per-channel and total power attacks. The former attack relies on per-channel measurements to perform a brute-force attack to reconstruct the quantum circuits. The latter attack performs a single-trace attack using Mixed-Integer Linear Programming optimization. Through the use of algebraic reconstruction, this work demonstrates that quantum circuit secrets can be stolen with high accuracy. Evaluation on 32 real benchmark quantum circuits shows that our technique is highly effective at reconstructing quantum circuits. The findings not only show the veracity of the potential attacks, but also the need to develop new means to protect quantum circuits from power trace attacks. Throughout this work real control pulse information from real quantum computers is used to demonstrate potential attacks based on simulation of collection of power traces.

Type
Publication
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)
Chuanqi Xu
Chuanqi Xu
Ph.D. Student

I am a PhD candidate at Yale University. My current research focuses on quantum computing and computer security, where I design novel attacks and defenses targeting quantum computers and quantum cloud providers. Specifically, my work explores security and privacy across the entire technology stack of quantum computers:

  1. Investigating vulnerabilities in quantum processors and qubit technologies.
  2. Developing secure and private quantum computer systems and architecture.
  3. Ensuring the security of quantum algorithms, with a focus on quantum machine learning (QML).

Previously, I worked on RTL design (Verilog) for FPGAs, implementing Post-Quantum Cryptography (PQC) that is secure to both classical and quantum computer attacks.

I am actively seeking roles as a research scientist, software engineer, and quant researcher. I am broadly interested in developing systems and infrastructure, especially for ML/GenAI infrastructure and systems.