Introduction to Programming with Python
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a thought-provoking Black Hat conference presentation that challenges the conventional focus on quantum computing's threat to classical encryption by examining the security vulnerabilities of quantum computers themselves. Dive into detailed analyses of popular quantum platforms like IBM and IonQ, along with quantum software development kits such as Qiskit. Learn about critical security weaknesses in the quantum software stack, including methods for authentication token theft, user impersonation, and malicious code injection that can compromise user credits and computational results. Discover proof-of-concept attacks targeting quantum processing units (QPUs), including qubit reset manipulation techniques that enable data theft from previous computations and result tampering. Examine how crosstalk vulnerabilities between qubits can be exploited to inject faults into other users' circuits on shared QPUs. Presented by Adrian Coleșa, Senior Security Researcher at Bitdefender, and Sorin Boloș, Quantum Software Engineer at Transilvania Quantum, this 38-minute presentation emphasizes the urgent need to address security concerns in quantum computing while building a more robust quantum ecosystem for the future.
Syllabus
From Weapon to Target: Quantum Computers Paradox
Taught by
Black Hat