{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T08:00:38Z","timestamp":1768032038105,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2312754"],"award-info":[{"award-number":["2312754"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3676536.3689916","type":"proceedings-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:21:20Z","timestamp":1744204880000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploration of Timing and Higher-Energy Attacks on Quantum Random Access Memory"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9321-7001","authenticated-orcid":false,"given":"Yizhuo","family":"Tan","sequence":"first","affiliation":[{"name":"Yale University, New Haven, Connecticut, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7518-5399","authenticated-orcid":false,"given":"Chuanqi","family":"Xu","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, Connecticut, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9721-3640","authenticated-orcid":false,"given":"Jakub","family":"Szefer","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, Connecticut, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon Web Services. 2023. Amazon Braket. https:\/\/aws.amazon.com\/braket\/"},{"key":"e_1_3_2_1_2_1","volume-title":"International Symposium on Low Power Electronics and Design (ISLPED)","author":"Ash-Saki Abdullah","unstructured":"Abdullah Ash-Saki, Mahabubul Alam, and Swaroop Ghosh. 2020. Analysis of Crosstalk in NISQ Devices and Security Implications in Multi-Programming Regime. In International Symposium on Low Power Electronics and Design (ISLPED). Association for Computing Machinery, 25--30."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2020.3023338"},{"key":"e_1_3_2_1_4_1","volume-title":"Qubit Sensing: A New Attack Model for Multi-programming Quantum Computing. arXiv:2104.05899","author":"Ash-Saki Abdullah","year":"2021","unstructured":"Abdullah Ash-Saki and Swaroop Ghosh. 2021. Qubit Sensing: A New Attack Model for Multi-programming Quantum Computing. arXiv:2104.05899"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/QCE53715.2022.00045"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090583.1648610"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.3.010329"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST54066.2022.9840181"},{"key":"e_1_3_2_1_9_1","volume-title":"Design of Quantum Computer Antivirus. In International Symposium on Hardware Oriented Security and Trust (HOST) (HOST). 260--270","author":"Deshpande Sanjay","year":"2023","unstructured":"Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang, Ferhat Erata, Song Han, Yongshan Ding, and Jakub Szefer. 2023. Design of Quantum Computer Antivirus. In International Symposium on Hardware Oriented Security and Trust (HOST) (HOST). 260--270."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/76\/7\/076001"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Ferhat Erata Chuanqi Xu Ruzica Piskac and Jakub Szefer. 2024. Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. arXiv:2401.15869 [cs.CR] https:\/\/arxiv.org\/abs\/2401.15869","DOI":"10.46586\/tches.v2024.i2.735-768"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.78.052310"},{"key":"e_1_3_2_1_13_1","volume-title":"Quantum random access memory. Physical review letters 100, 16","author":"Giovannetti Vittorio","year":"2008","unstructured":"Vittorio Giovannetti, Seth Lloyd, and Lorenzo Maccone. 2008. Quantum random access memory. Physical review letters 100, 16 (2008), 160501."},{"key":"e_1_3_2_1_14_1","unstructured":"IBM. 2024. Pulse schedules documentation. https:\/\/docs.quantum.ibm.com\/guides\/pulse#pulse-schedules."},{"key":"e_1_3_2_1_15_1","unstructured":"IBM. 2024. Quantum hardware pulses documentation. https:\/\/github.com\/Qiskit\/textbook\/tree\/main\/notebooks\/quantum-hardware-pulses."},{"key":"e_1_3_2_1_16_1","unstructured":"IBM Quantum. 2023. https:\/\/quantum-computing.ibm.com\/"},{"key":"e_1_3_2_1_17_1","unstructured":"IBM Quantum. 2023. The hardware and software for the era of quantum utility is here. https:\/\/research.ibm.com\/blog\/quantum-roadmap-2033."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304023"},{"key":"e_1_3_2_1_19_1","volume-title":"Quantum Leak: Timing Side-Channel Attacks on Cloud-Based Quantum Services. arXiv:2401.01521 [cs.ET] https:\/\/arxiv.org\/abs\/2401.01521","author":"Lu Chao","year":"2024","unstructured":"Chao Lu, Esha Telang, Aydin Aysu, and Kanad Basu. 2024. Quantum Leak: Timing Side-Channel Attacks on Cloud-Based Quantum Services. arXiv:2401.01521 [cs.ET] https:\/\/arxiv.org\/abs\/2401.01521"},{"key":"e_1_3_2_1_20_1","volume-title":"Securing Reset Operations in NISQ Quantum Computers. In Conference on Computer and Communications Security (CCS). Association for Computing Machinery, 2279--2293","author":"Mi Allen","year":"2022","unstructured":"Allen Mi, Shuwen Deng, and Jakub Szefer. 2022. Securing Reset Operations in NISQ Quantum Computers. In Conference on Computer and Communications Security (CCS). Association for Computing Machinery, 2279--2293."},{"key":"e_1_3_2_1_21_1","unstructured":"Microsoft Azure. 2023. Azure Quantum. https:\/\/azure.microsoft.com\/enus\/products\/quantum"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-08-06-79"},{"key":"e_1_3_2_1_23_1","article-title":"Realization of real-time fault-tolerant quantum error correction","author":"Ryan-Anderson Ciaran","year":"2021","unstructured":"Ciaran Ryan-Anderson, Justin G Bohnet, Kenny Lee, Daniel Gresh, Aaron Hankin, JP Gaebler, David Francois, Alexander Chernoguzov, Dominic Lucchetti, Natalie C Brown, et al. 2021. Realization of real-time fault-tolerant quantum error correction. Physical Review X 11, 4 (2021), 041058.","journal-title":"Physical Review"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01760-5"},{"key":"e_1_3_2_1_25_1","unstructured":"Jerry Tan Chuanqi Xu Theodoros Trochatos and Jakub Szefer. 2023. Extending and Defending Attacks on Reset Operations in Quantum Computers. arXiv:2309.06281 [cs.AR] https:\/\/arxiv.org\/abs\/2309.06281"},{"key":"e_1_3_2_1_26_1","volume-title":"Quantum Computing, Communication, and Simulation IV","author":"Valtinos Themistoklis","unstructured":"Themistoklis Valtinos, Aikaterini Mandilara, and Dimitris Syvridis. 2024. The Gell-Mann feature map of qutrits and its applications in classification tasks. In Quantum Computing, Communication, and Simulation IV, Vol. 12911. SPIE, 229--247."},{"key":"e_1_3_2_1_27_1","volume-title":"Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. In Conference on Computer and Communications Security","author":"Xu Chuanqi","year":"2023","unstructured":"Chuanqi Xu, Jessie Chen, Allen Mi, and Jakub Szefer. 2023. Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. In Conference on Computer and Communications Security (Copenhagen, Denmark) (CCS). Association for Computing Machinery."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623118"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55342.2024.10545386"}],"event":{"name":"ICCAD '24: 43rd IEEE\/ACM International Conference on Computer-Aided Design","location":"Newark Liberty International Airport Marriott New York NY USA","acronym":"ICCAD '24","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE EDS"]},"container-title":["Proceedings of the 43rd IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3689916","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3689916","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3689916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:45Z","timestamp":1750295925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3689916"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":29,"alternative-id":["10.1145\/3676536.3689916","10.1145\/3676536"],"URL":"https:\/\/doi.org\/10.1145\/3676536.3689916","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2025-04-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}