Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a thought-provoking Black Hat conference presentation that challenges the conventional focus on quantum computing's threat to classical encryption by examining the security vulnerabilities of quantum computers themselves. Dive into detailed analyses of popular quantum platforms like IBM and IonQ, along with quantum software development kits such as Qiskit. Learn about critical security weaknesses in the quantum software stack, including methods for authentication token theft, user impersonation, and malicious code injection that can compromise user credits and computational results. Discover proof-of-concept attacks targeting quantum processing units (QPUs), including qubit reset manipulation techniques that enable data theft from previous computations and result tampering. Examine how crosstalk vulnerabilities between qubits can be exploited to inject faults into other users' circuits on shared QPUs. Presented by Adrian Coleșa, Senior Security Researcher at Bitdefender, and Sorin Boloș, Quantum Software Engineer at Transilvania Quantum, this 38-minute presentation emphasizes the urgent need to address security concerns in quantum computing while building a more robust quantum ecosystem for the future.
Syllabus
From Weapon to Target: Quantum Computers Paradox
Taught by
Black Hat