{"id":"https://openalex.org/W4413176097","doi":"https://doi.org/10.1145/3708821.3735339","title":"POSTER: Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud Systems","display_name":"POSTER: Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud Systems","publication_year":2025,"publication_date":"2025-08-13","ids":{"openalex":"https://openalex.org/W4413176097","doi":"https://doi.org/10.1145/3708821.3735339"},"language":"en","primary_location":{"id":"doi:10.1145/3708821.3735339","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3708821.3735339","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017656922","display_name":"Wei Jie Bryan Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Wei Jie Bryan Lee","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008507189","display_name":"Siyi Wang","orcid":"https://orcid.org/0009-0006-9128-1857"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Siyi Wang","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113227050","display_name":"Siddartha Dutta","orcid":"https://orcid.org/0009-0001-4891-9919"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Suman Dutta","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093729487","display_name":"Walid El Maouaki","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Walid El Maouaki","raw_affiliation_strings":["Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017656922"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92387739,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1788","last_page":"1790"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.8309493064880371},{"id":"https://openalex.org/keywords/swap","display_name":"Swap (finance)","score":0.8130610585212708},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6818430423736572},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6753829121589661},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5527198314666748},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47828325629234314},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4155266284942627},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14142286777496338},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11203879117965698},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1101260781288147},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.10184833407402039}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8309493064880371},{"id":"https://openalex.org/C99821215","wikidata":"https://www.wikidata.org/wiki/Q1136583","display_name":"Swap (finance)","level":2,"score":0.8130610585212708},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6818430423736572},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6753829121589661},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5527198314666748},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47828325629234314},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4155266284942627},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14142286777496338},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11203879117965698},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1101260781288147},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.10184833407402039},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3708821.3735339","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3708821.3735339","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/201966","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/201966","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2946582523","https://openalex.org/W2970450884","https://openalex.org/W3000698183","https://openalex.org/W3047634080","https://openalex.org/W3104553508","https://openalex.org/W3104660409","https://openalex.org/W4378191729","https://openalex.org/W4388857527","https://openalex.org/W4388893936","https://openalex.org/W4393234688","https://openalex.org/W4400121150","https://openalex.org/W4407158326","https://openalex.org/W4412883246"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4323824501","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W2802581102"],"abstract_inverted_index":{"The":[0,109],"rapid":[1],"advancement":[2],"of":[3,12,23,117,138],"quantum":[4,14,27,87],"computing":[5],"has":[6],"led":[7],"to":[8,57],"an":[9,103],"increased":[10],"use":[11],"cloud-based":[13],"devices,":[15],"raising":[16],"concerns":[17],"over":[18,67],"the":[19,52,58,90,118,134],"privacy":[20],"and":[21,45,80],"security":[22],"computations":[24],"on":[25,84],"multi-tenant":[26],"systems.":[28],"Previous":[29],"studies":[30],"have":[31],"explored":[32],"crosstalk":[33,53],"in":[34,77,106,124,128],"these":[35],"environments,":[36],"but":[37],"several":[38],"questions":[39],"remain":[40],"regarding":[41],"its":[42,64],"causes,":[43],"countermeasures,":[44],"applicability.":[46],"In":[47,89],"this":[48],"work,":[49],"we":[50,71],"revisit":[51],"effect,":[54],"tracing":[55],"it":[56],"SWAP":[59],"path":[60],"between":[61,142],"qubits,":[62],"demonstrating":[63,144],"effectiveness":[65],"even":[66],"long":[68],"distances.":[69],"Specifically,":[70],"introduce":[72],"a":[73,93,113],"SWAP-based":[74],"side-channel":[75],"attack":[76],"both":[78],"active":[79,91],"passive":[81,110],"modes,":[82],"validated":[83],"real":[85],"IBM":[86],"devices.":[88],"attack,":[92,111],"single":[94],"CNOT":[95],"gate":[96],"disrupts":[97],"Grover\u2019s":[98],"Algorithm":[99],"from":[100],"afar":[101],"with":[102],"81.62%":[104],"reduction":[105],"output":[107],"accuracy.":[108],"using":[112],"circuit":[114,126],"just":[115],"6.25%":[116],"victim\u2019s":[119],"size,":[120],"achieves":[121],"100%":[122],"accuracy":[123],"predicting":[125],"attributes":[127],"Simon\u2019s":[129],"Algorithm.":[130],"These":[131],"findings":[132],"challenge":[133],"existing":[135],"defense":[136],"strategy":[137],"maximizing":[139],"topological":[140],"distance":[141],"circuits,":[143],"that":[145],"attackers":[146],"can":[147],"still":[148],"extract":[149],"sensitive":[150],"information":[151],"or":[152],"manipulate":[153],"results":[154],"remotely.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
