01 — Background: The Physical Layer and Its Security Properties
Superconducting quantum processors operate at millikelvin temperatures, with qubits implemented as anharmonic oscillators (transmons) coupled via microwave resonators. IBM's Heron r2 generation — the hardware used in this work — fields 133- to 156-qubit processors. Under IBM's current Open Plan, each submitted job receives exclusive device access: jobs queue and execute sequentially, not concurrently. This is an important distinction from the classical cloud model where VM co-tenancy is the norm.
Even without true concurrent multi-tenancy today, three features of superconducting hardware make crosstalk a security-relevant concern. First, qubits are coupled by design — you cannot remove the coupling without removing the ability to perform two-qubit gates. Second, this coupling is always-on: ZZ-type interaction persists between neighboring transmons even when no gate is being applied. Third, as providers optimize QPU utilization, concurrent scheduling is a known engineering direction — meaning the exposure window can only grow. Decoherence channels relevant to this threat model are: T₁ (energy relaxation), T₂ (dephasing), and ZZ-type crosstalk, which is proportional to qubit frequency proximity and physical adjacency in the coupling map.
02 — Attack Mechanism
Crosstalk Induction via Adversarial Circuit Design
The coupling strength ξ (crosstalk coefficient) between two qubits depends
on their transition frequencies ω_i and ω_j and the coupling
element g_ij. In this experiment, the attacker circuit and victim circuit
were submitted by the same researcher as sequential jobs on the same backend. The
attacker qubits were placed adjacent to victim qubits in the device's coupling map,
and the attack circuit was designed to maximize crosstalk injection by:
φ_err = ∫ ξ(t) dt on victim qubits,
effectively rotating them away from the target eigenstate.
Victim Circuit: 3-Qubit Grover Search
The victim runs a 3-qubit Grover algorithm targeting state |110⟩.
Under ideal simulation, Grover achieves P(correct) ≈ 88% (1 iteration).
On real Heron r2 hardware — before any attacker circuit is introduced — the
baseline drops to ~62–63%, reflecting intrinsic device noise.
With the attacker circuit active on adjacent boundary qubits, P(correct) falls
to between 21.8% and 44.9% depending on the backend, representing degradation
of 17.7 to 41.5 percentage points from the real-hardware baseline.
The random-chance floor for 8 equally-likely states is 12.5%.
CX_err = 100% — effectively dead
qubit links. The microwave pulses driving these non-functional CNOT gates inject
cross-resonance energy into neighboring qubits even without producing valid gate
operations. Observed degradation may therefore be amplified relative to
what a calibrated, functional crosstalk boundary would produce.
This is an acknowledged methodological limitation; validation on a working boundary
pair is the next experimental step.
03 — Hardware Validation
Results were validated on three IBM Quantum Heron r2 backends on 2026-03-17,
using the Qiskit Runtime Sampler primitive (8192 shots per job). The attack boundary
was identified automatically by querying the CX/ECR error map via
IBMBackend.properties() and selecting the highest-error adjacent pair.
In all three cases the auto-selected boundary had CX_err = 100% — see caveat above.
A defining characteristic of the attack across all backends: the IBM Quantum API
returned "error": null for every job. The platform reported nominal
success while delivering results with substantially eroded correctness. No alert,
no flag, no anomaly in the job metadata. The degradation is silent by design —
not a gap in IBM's monitoring, but a consequence of the platform having no means
to distinguish adversarial crosstalk from ordinary hardware noise in a single run.
Victim job:
d6spbovgtkcc73clrgj0 · P(|110⟩) = 62.2%Attack job:
d6spbp6sh9gc73dhq3hg · P(|110⟩) = 36.6% · Δ = −25.5ppibm_fez (Heron r2, 156q) · Victim qubits: q[17,7,6] · Attack boundary: q[27]↔q[28]
Victim job:
d6spcaf90okc73esjd8g · P(|110⟩) = 63.3%Attack job:
d6spcamsh9gc73dhq440 · P(|110⟩) = 21.8% · Δ = −41.5ppibm_marrakesh (Heron r2, 156q) · Victim qubits: q[83,84,85] · Attack boundary: q[81]↔q[82]
Victim job:
d6spcg3bjfas73fooht0 · P(|110⟩) = 62.6%Attack job:
d6spcgesh9gc73dhq4c0 · P(|110⟩) = 44.9% · Δ = −17.7ppAll job IDs are verifiable by anyone with an IBM Quantum account. API response:
error: null on all six jobs.
04 — Defense Mechanisms Evaluated
Three mitigation strategies were evaluated using the ibm_hanoi noise model in simulation (AerSimulator). These results are simulation-only and have not been validated on real hardware. They illustrate directional tradeoffs, not operational guarantees.
D2 — Noise-Aware Qubit Allocation: greedy scoring of qubit placements by CX error contribution. The notebook's greedy allocator achieves +1.7pp improvement under active attack — a proof-of-concept only. The paper's full RL agent (trained on 500,000 circuits) achieves 0.49 → 0.92 fidelity; that result is not replicated here.
D3 — Spectator Qubit Detection: a sentinel qubit placed adjacent to the victim monitors for anomalous |1⟩ states mid-circuit, enabled by IBM Eagle/Heron mid-circuit measurement (not available at the original paper's publication time). Circuit-based simulation at xt=1.0: detection rate = 53%, but post-selection on "clean" shots does not recover accuracy (23.1% with post-selection vs. 24.4% without). At full attack strength, crosstalk is diffuse enough to contaminate all shots. Detection ≠ correction.
05 — Live Interactive Demo
The panel below is a real-time simulation of the quantum crosstalk attack.
The left column shows a 5-qubit segment of a Heron r2 coupling topology in 3D,
with victim qubits (cyan), attacker qubits (red), and the boundary
qubit (amber) highlighted. The center shows the measurement probability
histogram — watch |110⟩ collapse as you launch the attack.
This is an interactive simulation calibrated to real hardware noise
parameters; it is not live hardware.
06 — Implications and Contributions
This work demonstrates that ZZ-coupling in superconducting hardware is a physically inescapable noise amplification pathway that an adversary can leverage by deliberate circuit design. The key security-relevant finding is not that IBM's current scheduler is broken — it isn't — but that the physical substrate on which any concurrent scheduler would operate carries an inherent, unaddressable crosstalk channel. As QPU utilization pressure pushes providers toward true concurrent multi-tenancy, this channel becomes an active threat surface.
Three contributions extend beyond the baseline paper (Harper et al.): (1) an ATT&CK-Q taxonomy mapping crosstalk attack variants to a quantum-adapted MITRE ATT&CK-style framework; (2) a Spectator Qubit detection circuit leveraging mid-circuit measurement now available on Eagle/Heron — a capability that post-dates the original paper; and (3) a multi-backend replication across three Heron r2 devices on the same date, with verifiable job IDs and consistent degradation patterns, demonstrating that the effect is architecture-level rather than device-specific.
security@us.ibm.com) prior to the talk is strongly
recommended as a matter of professional practice.
References
qvuln_2026_xtalk_001_evidence.json — verifiable via IBM Quantum account.
Experiment date: 2026-03-17. All jobs returned error: null.