Pulse-Level Simulation of Crosstalk Attacks on Superconducting Quantum Hardware
By: Syed Emad Uddin Shubha, Tasnuva Farheen
Potential Business Impact:
Protects secret quantum computer information from hackers.
Hardware crosstalk in multi-tenant superconducting quantum computers poses a severe security threat, allowing adversaries to induce targeted errors across tenant boundaries by injecting carefully engineered pulses. We present a simulation-based study of active crosstalk attacks at the pulse level, analyzing how adversarial control of pulse timing, shape, amplitude, and coupling can disrupt a victim's computation. Our framework models the time-dependent dynamics of a three-qubit system in the rotating frame, capturing both always-on couplings and injected drive pulses. We examine two attack strategies: attacker-first (pulse before victim operation) and victim-first (pulse after), and systematically identify the pulse and coupling configurations that cause the largest logical errors. Protocol-level experiments on quantum coin flip and XOR classification circuits show that some protocols are highly vulnerable to these attacks, while others remain robust. Based on these findings, we discuss practical methods for detection and mitigation to improve security in quantum cloud platforms.
Similar Papers
Pulse-to-Circuit Characterization of Stealthy Crosstalk Attack on Multi-Tenant Superconducting Quantum Hardware
Quantum Physics
Protects secret quantum computer information from hackers.
Schrodinger's Toolbox: Exploring the Quantum Rowhammer Attack
Quantum Physics
Hackers can spy on quantum computers.
A Piece of QAICCC: Towards a Countermeasure Against Crosstalk Attacks in Quantum Servers
Software Engineering
Secures quantum computers for everyone to use.