Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED
dc.contributor.author | Miles, Samuel | |
dc.contributor.author | McDonough, Corey | |
dc.contributor.author | Michael, Emmanuel Obichukwu | |
dc.contributor.author | Shankar Kumar, Valli Sanghami | |
dc.contributor.author | Lee, John J. | |
dc.contributor.department | Electrical and Computer Engineering, School of Engineering and Technology | en_US |
dc.date.accessioned | 2022-11-08T17:51:50Z | |
dc.date.available | 2022-11-08T17:51:50Z | |
dc.date.issued | 2022-03 | |
dc.description.abstract | This paper proposes a simulation of the 5-stage pipelined MIPS processor using Node-RED and illustrates the basic effects of modern CPU vulnerabilities. Demonstrated in this study are Spectre vulnerability attack and load value injection (LVI) transient-execution attack. The storing of secret data within the cache is shown for Spectre, and through the use of an attacker’s injected page number after a page fault has occurred, we demonstrate LVI’s ability to access the host secrets via simulated memory hierarchy. The persistence of the secret data in the cache can also be observed in the case of both attacks. The characteristics of such security vulnerabilities are successfully simulated with the proposed Node-RED-based processor simulator. | en_US |
dc.eprint.version | Author's manuscript | en_US |
dc.identifier.citation | Miles, S., McDonough, C., Michael, E. O., Shankar Kumar, V. S., & Lee, J. J. (2022). Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED. In P. Verma, C. Charan, X. Fernando, & S. Ganesan (Eds.), Advances in Data Computing, Communication and Security (Vol. 106, pp. 707–716). Springer Nature Singapore. https://doi.org/10.1007/978-981-16-8403-6_65 | en_US |
dc.identifier.uri | https://hdl.handle.net/1805/30496 | |
dc.language.iso | en_US | en_US |
dc.publisher | Springer | en_US |
dc.relation.isversionof | 10.1007/978-981-16-8403-6_65 | en_US |
dc.relation.journal | Advances in Data Computing, Communication and Security | en_US |
dc.rights | Publisher Policy | en_US |
dc.source | Author | en_US |
dc.subject | 5-stage pipelined MIPS | en_US |
dc.subject | Node-RED | en_US |
dc.subject | load value injection | en_US |
dc.title | Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Miles2022Simulating-AAM.pdf
- Size:
- 610.76 KB
- Format:
- Adobe Portable Document Format
- Description:
- Book Chapter
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.99 KB
- Format:
- Item-specific license agreed upon to submission
- Description: