Miles, SamuelMcDonough, CoreyMichael, Emmanuel ObichukwuShankar Kumar, Valli SanghamiLee, John J.2022-11-082022-11-082022-03Miles, S., McDonough, C., Michael, E. O., Shankar Kumar, V. S., & Lee, J. J. (2022). Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED. In P. Verma, C. Charan, X. Fernando, & S. Ganesan (Eds.), Advances in Data Computing, Communication and Security (Vol. 106, pp. 707–716). Springer Nature Singapore. https://doi.org/10.1007/978-981-16-8403-6_65https://hdl.handle.net/1805/30496This paper proposes a simulation of the 5-stage pipelined MIPS processor using Node-RED and illustrates the basic effects of modern CPU vulnerabilities. Demonstrated in this study are Spectre vulnerability attack and load value injection (LVI) transient-execution attack. The storing of secret data within the cache is shown for Spectre, and through the use of an attacker’s injected page number after a page fault has occurred, we demonstrate LVI’s ability to access the host secrets via simulated memory hierarchy. The persistence of the secret data in the cache can also be observed in the case of both attacks. The characteristics of such security vulnerabilities are successfully simulated with the proposed Node-RED-based processor simulator.en-USPublisher Policy5-stage pipelined MIPSNode-REDload value injectionSimulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-REDArticle