Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED

dc.contributor.authorMiles, Samuel
dc.contributor.authorMcDonough, Corey
dc.contributor.authorMichael, Emmanuel Obichukwu
dc.contributor.authorShankar Kumar, Valli Sanghami
dc.contributor.authorLee, John J.
dc.contributor.departmentElectrical and Computer Engineering, School of Engineering and Technologyen_US
dc.date.accessioned2022-11-08T17:51:50Z
dc.date.available2022-11-08T17:51:50Z
dc.date.issued2022-03
dc.description.abstractThis paper proposes a simulation of the 5-stage pipelined MIPS processor using Node-RED and illustrates the basic effects of modern CPU vulnerabilities. Demonstrated in this study are Spectre vulnerability attack and load value injection (LVI) transient-execution attack. The storing of secret data within the cache is shown for Spectre, and through the use of an attacker’s injected page number after a page fault has occurred, we demonstrate LVI’s ability to access the host secrets via simulated memory hierarchy. The persistence of the secret data in the cache can also be observed in the case of both attacks. The characteristics of such security vulnerabilities are successfully simulated with the proposed Node-RED-based processor simulator.en_US
dc.eprint.versionAuthor's manuscripten_US
dc.identifier.citationMiles, S., McDonough, C., Michael, E. O., Shankar Kumar, V. S., & Lee, J. J. (2022). Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED. In P. Verma, C. Charan, X. Fernando, & S. Ganesan (Eds.), Advances in Data Computing, Communication and Security (Vol. 106, pp. 707–716). Springer Nature Singapore. https://doi.org/10.1007/978-981-16-8403-6_65en_US
dc.identifier.urihttps://hdl.handle.net/1805/30496
dc.language.isoen_USen_US
dc.publisherSpringeren_US
dc.relation.isversionof10.1007/978-981-16-8403-6_65en_US
dc.relation.journalAdvances in Data Computing, Communication and Securityen_US
dc.rightsPublisher Policyen_US
dc.sourceAuthoren_US
dc.subject5-stage pipelined MIPSen_US
dc.subjectNode-REDen_US
dc.subjectload value injectionen_US
dc.titleSimulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-REDen_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Miles2022Simulating-AAM.pdf
Size:
610.76 KB
Format:
Adobe Portable Document Format
Description:
Book Chapter
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.99 KB
Format:
Item-specific license agreed upon to submission
Description: