Skip to main content
Article
Analyzing D-wave quantum macro assembler security
Advances in Intelligent Systems and Computing
  • Hesham H. Alsaadi, Zayed University
  • Monther Aldwairi, Zayed University
  • Eva Marie Muller-Stuler, Laniakea Labs
Document Type
Conference Proceeding
Publication Date
1-1-2019
Abstract

As we enter the quantum computing era, security becomes of at most importance. With the release of D-Wave One in 2011 and most recently the 2000Q, with 2,000 qubits, and with NASA and Google using D-wave Systems quantum computers, a thorough examination of quantum computer security is needed. Quantum computers underlying hardware is not compatible with classical boolean and binary-based computer systems and software. Assemblers and compliers translate modern programming languages and problems into quantum-annealing methods compatible with quantum computers. This paper presents a vulnerability assessment utilizing static source code analysis on Qmasm Python tool. More specifically, we use flow-sensitive, inter-procedural and context-sensitive data flow analysis to uncover vulnerable points in the program. We demonstrate the Qmasm security flaws that can leave D-Wave 2X system vulnerable to severe threats.

ISBN
9783030140694
Publisher
Springer
Scopus ID
85090458470
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1007/978-3-030-14070-0_19
Citation Information
Hesham H. Alsaadi, Monther Aldwairi and Eva Marie Muller-Stuler. "Analyzing D-wave quantum macro assembler security" Advances in Intelligent Systems and Computing Vol. 800 Part F1 (2019) p. 125 - 132 ISSN: <a href="https://v2.sherpa.ac.uk/id/publication/issn/2194-5365" target="_blank">2194-5365</a>
Available at: http://works.bepress.com/monther-aldwairi/11/