{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T15:10:08Z","timestamp":1751037008306,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2129675, 2210963, 2040667, 1821766, 2113839"],"award-info":[{"award-number":["2129675, 2210963, 2040667, 1821766, 2113839"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3716368.3735298","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T13:58:23Z","timestamp":1751032703000},"page":"273-277","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Inverse-Transpilation: Reverse-Engineering Quantum Compiler Optimization Passes from Circuit Snapshots"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2140-6486","authenticated-orcid":false,"given":"Satwik","family":"Kundu","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Pennsylvania State University, State College, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-490X","authenticated-orcid":false,"given":"Swaroop","family":"Ghosh","sequence":"additional","affiliation":[{"name":"School of EECS, Pennsylvania State University, State College, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,6,29]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"Rajeev Acharya et\u00a0al. 2024. Quantum error correction below the surface code threshold. Nature (2024)."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Fan Chen et\u00a0al. 2024. NISQ Quantum Computing: A Security-Centric Tutorial and Survey [Feature]. IEEE Circuits and Systems Magazine 24 1 (2024) 14\u201332.","DOI":"10.1109\/MCAS.2024.3349665"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Frederic\u00a0T Chong et\u00a0al. 2017. Programming languages and compiler design for realistic quantum hardware. Nature 549 7671 (2017) 180\u2013187.","DOI":"10.1038\/nature23459"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Navnil Choudhury et\u00a0al. 2024. Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.10507 (2024).","DOI":"10.14722\/ndss.2025.242185"},{"key":"e_1_3_3_1_6_2","unstructured":"Atom Computing. 2023. Quantum startup Atom Computing first to exceed 1 000 qubits. Press Release. Accessed: Oct 28 (2023)."},{"key":"e_1_3_3_1_7_2","unstructured":"Jay Gambetta. 2023. The hardware and software for the era of quantum utility is here."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3689939.3695783"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Jonas Haferkamp. 2022. Random quantum circuits are approximate unitary t-designs. Quantum 6 (2022) 795.","DOI":"10.22331\/q-2022-09-08-795"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Nathan Killoran et\u00a0al. 2019. Strawberry fields: A software platform for photonic quantum computing. Quantum 3 (2019) 129.","DOI":"10.22331\/q-2019-03-11-129"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Fabian Kreppel et\u00a0al. 2023. Quantum circuit compiler for a shuttling-based trapped-ion quantum computer. Quantum 7 (2023) 1176.","DOI":"10.22331\/q-2023-11-08-1176"},{"key":"e_1_3_3_1_12_2","unstructured":"Satwik Kundu and Swaroop Ghosh. 2024. Adversarial poisoning attack on quantum machine learning models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2411.14412 (2024)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304023"},{"volume-title":"Introduction to Transpilation","author":"Quantum IBM","key":"e_1_3_3_1_14_2","unstructured":"IBM Quantum. [n. d.]. Introduction to Transpilation. https:\/\/docs.quantum.ibm.com\/guides\/transpile"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Microsoft\u00a0Azure Quantum et\u00a0al. 2025. Interferometric single-shot parity measurement in InAs\u2013Al hybrid devices. Nature 638 8051 (2025) 651\u2013655.","DOI":"10.1038\/s41586-024-08445-2"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Nils Quetschlich Lukas Burgholzer and Robert Wille. 2025. MQT Predictor: Automatic device selection with device-specific circuit compilation for quantum computing. ACM Transactions on Quantum Computing 6 1 (2025) 1\u201326.","DOI":"10.1145\/3673241"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55342.2024.10545389"},{"key":"e_1_3_3_1_18_2","unstructured":"Rupshali Roy Archisman Ghosh and Swaroop Ghosh. 2024. Forensics of Transpiled Quantum Circuits. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.18939 (2024)."},{"key":"e_1_3_3_1_19_2","unstructured":"Francisco\u00a0JR Ruiz et\u00a0al. 2025. Quantum circuit optimization with alphatensor. Nature Machine Intelligence (2025) 1\u201312."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643478"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Seyon Sivarajah et\u00a0al. 2020. t| ket>: a retargetable compiler for NISQ devices. Quantum Science and Technology 6 1 (2020) 014003.","DOI":"10.1088\/2058-9565\/ab8e92"},{"key":"e_1_3_3_1_22_2","unstructured":"Yizhuo Tan Navnil Choudhury Kanad Basu and Jakub Szefer. 2025. QubitHammer Attacks: Qubit Flipping Attacks in Multi-tenant Superconducting Quantum Computers. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2504.07875 (2025)."},{"key":"e_1_3_3_1_23_2","first-page":"83","volume-title":"2025 IEEE Symposium on Security and Privacy (SP)","author":"Xu Chuanqi","year":"2024","unstructured":"Chuanqi Xu and Jakub Szefer. 2024. Security Attacks Abusing Pulse-level Quantum Circuits. In 2025 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 83\u201383."},{"key":"e_1_3_3_1_24_2","unstructured":"Henry Zou Matthew Treinish Kevin Hartman Alexander Ivrii and Jake Lishman. 2024. LightSABRE: A Lightweight and Enhanced SABRE Algorithm. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2409.08368 (2024)."}],"event":{"name":"GLSVLSI '25: Great Lakes Symposium on VLSI 2025","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"New Orleans LA USA","acronym":"GLSVLSI '25"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2025"],"original-title":[],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T14:37:23Z","timestamp":1751035043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716368.3735298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,29]]},"references-count":23,"alternative-id":["10.1145\/3716368.3735298","10.1145\/3716368"],"URL":"https:\/\/doi.org\/10.1145\/3716368.3735298","relation":{},"subject":[],"published":{"date-parts":[[2025,6,29]]},"assertion":[{"value":"2025-06-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}