144 research outputs found

    Classification of Quantum Computer Fault Injection Attacks

    Full text link
    The rapid growth of interest in quantum computing has brought about the need to secure these powerful machines against a range of physical attacks. As qubit counts increase and quantum computers achieve higher levels of fidelity, their potential to execute novel algorithms and generate sensitive intellectual property becomes more promising. However, there is a significant gap in our understanding of the vulnerabilities these computers face in terms of security and privacy attacks. Among the potential threats are physical attacks, including those orchestrated by malicious insiders within data centers where the quantum computers are located, which could compromise the integrity of computations and resulting data. This paper presents an exploration of fault-injection attacks as one class of physical attacks on quantum computers. This work first introduces a classification of fault-injection attacks and strategies, including the domain of fault-injection attacks, the fault targets, and fault manifestations in quantum computers. The resulting classification highlights the potential threats that exist. By shedding light on the vulnerabilities of quantum computers to fault-injection attacks, this work contributes to the development of robust security measures for this emerging technology.Comment: 7 pages, 4 figure

    The epiphytic bryophyte succession of Buxus sempervirens forests in the Fırtına Valley, Rize (North Türkiye)

    Get PDF
    In this study, the epiphytic bryophyte succession of the Buxus sempervirens L. forests in Fırtına Valley (Çamlıhemşin-Rize, North Türkiye), one of the nine biodiversity hotspots in Türkiye, were investigated. For this purpose, a total of 60 sampling plots were taken from the live trunks of the B. sempervirens trees of different ages. Twenty-nine epiphytic bryophyte species were determined (24 mosses and 5 liverworts) within the sample plots. Also, six different life form types and four different habitat affinity categories were determined. The mat type life form is in the first place with 34.4% whereas the and cortico-saxicolous species are the most common with 51.7%. Two-Way Indicator Species Analysis (TWINSPAN) classified the epiphytic bryophyte communities on the trunks of the B. sempervirens at the second level into two main clusters (A and B) and three sub-clusters (A1, B1 and, B2). Detrended Correspondence Analysis (DCA) axis 1 was interpreted as gradient along the height of the epiphytic habitat (from the lower base to the upper zone) on trunks and the DCA axis 2 was interpreted as gradient of moisture (from mesic to xeric). Exsertotheca crispa (Hedw.) S.Olsson, Enroth & D.Quandt was the species with the highest Index of Ecological Significance (IES) value on the lower bases of the aged trees. Species diversity and epiphytic cover in the upper zones were lower than in the basal and middle zones in the study area. While Metzgeria furcata, (L.) Corda, Oxyrrhynchium hians (Hedw.) Loeske, Plagiothecium nemorale (Mitt.) A.Jaeger, and Radula lindenbergiana Gottsche ex C.Hartm were only found on old trees, Ctenidium molluscum (Hedw.) Mitt. and Pseudoleskeella nervosa (Brid.) Nyholm were only found on middle-aged trees

    Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code

    Full text link
    Although cryptographic algorithms may be mathematically secure, it is often possible to leak secret information from the implementation of the algorithms. Timing and power side-channel vulnerabilities are some of the most widely considered threats to cryptographic algorithm implementations. Timing vulnerabilities may be easier to detect and exploit, and all high-quality cryptographic code today should be written in constant-time style. However, this does not prevent power side-channels from existing. With constant time code, potential attackers can resort to power side-channel attacks to try leaking secrets. Detecting potential power side-channel vulnerabilities is a tedious task, as it requires analyzing code at the assembly level and needs reasoning about which instructions could be leaking information based on their operands and their values. To help make the process of detecting potential power side-channel vulnerabilities easier for cryptographers, this work presents Pascal: Power Analysis Side Channel Attack Locator, a tool that introduces novel symbolic register analysis techniques for binary analysis of constant-time cryptographic algorithms, and verifies locations of potential power side-channel vulnerabilities with high precision. Pascal is evaluated on a number of implementations of post-quantum cryptographic algorithms, and it is able to find dozens of previously reported single-trace power side-channel vulnerabilities in these algorithms, all in an automated manner

    A Model-Driven Engineering Technique for Developing Composite Content Applications

    Get PDF
    Composite Content Applications (CCA) are cross-functional process solutions built on top of Enterprise Content Management systems assembled from pre-built components. Considering the complexity of CCAs, their analysis and development need higher level of abstraction. Model-driven engineering techniques covering the use of Domain-specific Modeling Languages (DSMLs), can provide the abstraction in question by moving software development from code to models which may increase productivity and reduce development costs. Hence, in this paper, we present MDD4CCA, a DSML for developing CCAs. The DSML presents an abstract syntax, a concrete syntax, and an operational semantics, including model-to-model and model-to-code transformations for CCA implementations. Use of the proposed language is evaluated within an industrial case study

    ETAP: Energy-aware Timing Analysis of Intermittent Programs

    Get PDF
    Energy harvesting battery-free embedded devices rely only on ambient energy harvesting that enables stand-alone and sustainable IoT applications. These devices execute programs when the harvested ambient energy in their energy reservoir is sufficient to operate and stop execution abruptly (and start charging) otherwise. These intermittent programs have varying timing behavior under different energy conditions, hardware configurations, and program structures. This paper presents Energy-aware Timing Analysis of intermittent Programs (ETAP), a probabilistic symbolic execution approach that analyzes the timing and energy behavior of intermittent programs at compile time. ETAP symbolically executes the given program while taking time and energy cost models for ambient energy and dynamic energy consumption into account. We evaluated ETAP on several intermittent programs and compared the compile-time analysis results with executions on real hardware. The results show that ETAP's normalized prediction accuracy is 99.5%, and it speeds up the timing analysis by at least two orders of magnitude compared to manual testing.Comment: Corrected typos in the previous submissio

    ETAP: Energy-Aware Timing Analysis of Intermittent Programs

    Get PDF
    Energy harvesting battery-free embedded devices rely only on ambient energy harvesting that enables stand-alone and sustainable IoT applications. These devices execute programs when the harvested ambient energy in their energy reservoir is sufficient to operate and stop execution abruptly (and start charging) otherwise. These intermittent programs have varying timing behavior under different energy conditions, hardware configurations, and program structures. This article presents Energy-aware Timing Analysis of intermittent Programs (ETAP), a probabilistic symbolic execution approach that analyzes the timing and energy behavior of intermittent programs at compile time. ETAP symbolically executes the given program while taking time and energy cost models for ambient energy and dynamic energy consumption into account. We evaluate ETAP by comparing the compile-time analysis results of our benchmark codes and real-world application with the results of their executions on real hardware. Our evaluation shows that ETAP’s prediction error rate is between 0.0076% and 10.8%, and it speeds up the timing analysis by at least two orders of magnitude compared to manual testing.acceptedVersio

    AlloyInEcore: Embedding of First-Order Relational Logic into Meta-Object Facility for Automated Model Reasoning

    Get PDF
    We present AlloyInEcore, a tool for specifying metamodels with their static semantics to facilitate automated, formal reasoning on models. Software development projects require that software systems be specified in various models (e.g., requirements models, architecture models, test models, and source code). It is crucial to reason about those models to ensure the correct and complete system specifications. AlloyInEcore allows the user to specify metamodels with their static semantics, while, using the semantics, it automatically detects inconsistent models, and completes partial models. It has been evaluated on three industrial case studies in the automotive domain (https://modelwriter.github.io/AlloyInEcore/)

    Three Sphagnum taxa new to Turkey and South-West Asia

    Get PDF
    Sphagnum jensenii, S. fallax var. isoviitae, and S. pylaesii were found as new to Turkey and Southwest Asia following a bryological field trip to the Giresun province of Turkey. Sphagnum fallax var. isoviitae was also new to Asia. Descriptions, illustrations, world distribution, ecology, and comparisons with related species are presented

    New epiphytic bryophyte communities from Turkey

    Get PDF
    The epiphytic bryophyte vegetation of the Kümbet Plateau (Dereli-Giresun) was investigated. A total of 40 relevés taken from tree trunks in different vegetation periods of the year 2019 were analysed using multivariate analysis methods such as detrended correspondence analysis (DECORANA) and two-way indicator species analysis (TWINSPAN), and the Braun-Blanquet method was also applied. As a result, Frullanio tamarisci-Neckeretum pumilae Alataş, Ezer, Batan & Erata ass. nov. and Frullanio tamarisci-Neckeretum pumilae-isothecietosum alopecuroidis Alataş, Ezer, Batan & Erata subass. nov. were described as new syntaxa from Turkey. In addition, Ulotetum crispae -sanionietosum uncinatae was recorded for the first time from Turkey, while Ulotetum crispae was recorded for the second time from Turkey. These syntaxa were analysed in terms of their ecological and floristic aspects

    Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

    Get PDF
    The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access to power traces, attackers can recover information about the control pulses sent to quantum computers. From the control pulses, the gate level description of the circuits, and eventually the secret algorithms can be reverse engineered. This work demonstrates how and what information could be recovered. This work uses algebraic reconstruction from power traces to realize two new types of single trace attacks: per-channel and total power attacks. The former attack relies on per-channel measurements to perform a brute-force attack to reconstruct the quantum circuits. The latter attack performs a single-trace attack using Mixed-Integer Linear Programming optimization. Through the use of algebraic reconstruction, this work demonstrates that quantum circuit secrets can be stolen with high accuracy. Evaluation on 32 real benchmark quantum circuits shows that our technique is highly effective at reconstructing quantum circuits. The findings not only show the veracity of the potential attacks, but also the need to develop new means to protect quantum circuits from power trace attacks. Throughout this work real control pulse information from real quantum computers is used to demonstrate potential attacks based on simulation of collection of power traces
    corecore