Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED
If you need an accessible version of this item, please email your request to digschol@iu.edu so that they may create one and provide it to you.
Date
2022-03
Language
American English
Embargo Lift Date
Committee Members
Degree
Degree Year
Department
Grantor
Journal Title
Journal ISSN
Volume Title
Found At
Springer
Abstract
This paper proposes a simulation of the 5-stage pipelined MIPS processor using Node-RED and illustrates the basic effects of modern CPU vulnerabilities. Demonstrated in this study are Spectre vulnerability attack and load value injection (LVI) transient-execution attack. The storing of secret data within the cache is shown for Spectre, and through the use of an attacker’s injected page number after a page fault has occurred, we demonstrate LVI’s ability to access the host secrets via simulated memory hierarchy. The persistence of the secret data in the cache can also be observed in the case of both attacks. The characteristics of such security vulnerabilities are successfully simulated with the proposed Node-RED-based processor simulator.
Description
item.page.description.tableofcontents
item.page.relation.haspart
Cite As
Miles, S., McDonough, C., Michael, E. O., Shankar Kumar, V. S., & Lee, J. J. (2022). Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED. In P. Verma, C. Charan, X. Fernando, & S. Ganesan (Eds.), Advances in Data Computing, Communication and Security (Vol. 106, pp. 707–716). Springer Nature Singapore. https://doi.org/10.1007/978-981-16-8403-6_65
ISSN
Publisher
Series/Report
Sponsorship
Major
Extent
Identifier
Relation
Journal
Advances in Data Computing, Communication and Security
Source
Author
Alternative Title
Type
Article
Number
Volume
Conference Dates
Conference Host
Conference Location
Conference Name
Conference Panel
Conference Secretariat Location
Permanent Link
Version
Author's manuscript