Skip to main content

Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED

  • Conference paper
  • First Online:
Advances in Data Computing, Communication and Security

Abstract

This paper proposes a simulation of the 5-stage pipelined MIPS processor using Node-RED and illustrates the basic effects of modern CPU vulnerabilities. Demonstrated in this study are Spectre vulnerability attack and load value injection (LVI) transient-execution attack. The storing of secret data within the cache is shown for Spectre, and through the use of an attacker’s injected page number after a page fault has occurred, we demonstrate LVI’s ability to access the host secrets via simulated memory hierarchy. The persistence of the secret data in the cache can also be observed in the case of both attacks. The characteristics of such security vulnerabilities are successfully simulated with the proposed Node-RED-based processor simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
EUR 29.95
Price includes VAT (Austria)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 192.59
Price includes VAT (Austria)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 252.99
Price includes VAT (Austria)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, Y. Yarom, Spectre attacks: Exploiting speculative execution, in 2019 IEEE Symposium on Security and Privacy (SP) (2019), pp. 1–19

    Google Scholar 

  2. M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, M. Hamburg, Meltdown. arXiv:1801.01207 (2018)

  3. IBM, Node-RED. https://nodered.org/. Accessed May 7, 2021

  4. J. Van Bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikxi, F. Piessens, M. Silberstein, T. Wenisch, Y. Yarom, R. Strackx, Foreshadow: extracting the keys to the Intel SGX kingdom with transient out-of-order execution. in 27th USENIX Security Symposium (USENIX Security 18) (2018), pp. 991–1008

    Google Scholar 

  5. C. Canella, D. Genkin, L. Giner, D. Gruss, M. Lipp, M. Minkin, D. Moghimi, F. Piessens, M. Schwarz, B. Sunar, J. Van Bulck, Y. Yarom, Fallout: Leaking data on meltdown-resistant CPUs, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019), pp. 769–784

    Google Scholar 

  6. C. Canella, K. Khasawneh, D. Gruss, The evolution of transient-execution attacks, in Proceedings of the 2020 on Great Lakes Symposium on VLSI (2020), pp. 163–168

    Google Scholar 

  7. C. Canella, S.M. Pudukotai Dinakarrao, D. Gruss, K. Khasawneh, Evolution of defenses against transient-execution attacks, in Proceedings of the 2020 on Great Lakes Symposium on VLSI (2020), pp. 169–174

    Google Scholar 

  8. O. Oleksenko, B. Trach, M. Silberstein, C. Fetzer, SpecFuzz: bringing spectre-type vulnerabilities to the surface, in 29th USENIX Security Symposium (USENIX Security 20) (2020), pp. 1481–1498

    Google Scholar 

  9. mips.com, MIPS Architecture For Programmers Volume 1-A, Available via DIALOG. https://s3-eu-west-1.amazonaws.com/downloads-mips/documents/MD00082-2B-MIPS32INT-AFP-06.01.pdf. Accessed May 7, 2021

  10. K. Vollmar, P. Sanderson, MARS: an education-oriented MIPS assembly language simulator. SIGCSE 6, 239–243 (2006)

    Article  Google Scholar 

  11. J. Van Bulck, D. Moghimi, M. Schwarz, M. Lipp, M. Minkin, D. Genkin, Y. Yarom, B. Sunar, D. Gruss, F. Piessens, LVI: Hijacking transient execution through microarchitectural load value injection in 2020 IEEE Symposium on Security and Privacy (SP) (2020), pp. 54–72

    Google Scholar 

  12. Intel, An optimizzed mitigation approach for load value injection. https://intel.ly/2CSsHwp. Accessed May 10, 2021

  13. M. Larabel, The brutal performance impact from mitigating the LVI vulnerability. https://www.phoronix.com/scan.php?page=article&item=lvi-attack-perf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samuel Miles .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Miles, S., McDonough, C., Michael, E.O., Shankar Kumar, V.S., Lee, J.J. (2022). Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED. In: Verma, P., Charan, C., Fernando, X., Ganesan, S. (eds) Advances in Data Computing, Communication and Security. Lecture Notes on Data Engineering and Communications Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-16-8403-6_65

Download citation

Publish with us

Policies and ethics