Abstract
This paper proposes a simulation of the 5-stage pipelined MIPS processor using Node-RED and illustrates the basic effects of modern CPU vulnerabilities. Demonstrated in this study are Spectre vulnerability attack and load value injection (LVI) transient-execution attack. The storing of secret data within the cache is shown for Spectre, and through the use of an attacker’s injected page number after a page fault has occurred, we demonstrate LVI’s ability to access the host secrets via simulated memory hierarchy. The persistence of the secret data in the cache can also be observed in the case of both attacks. The characteristics of such security vulnerabilities are successfully simulated with the proposed Node-RED-based processor simulator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
P. Kocher, J. Horn, A. Fogh, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, Y. Yarom, Spectre attacks: Exploiting speculative execution, in 2019 IEEE Symposium on Security and Privacy (SP) (2019), pp. 1–19
M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, M. Hamburg, Meltdown. arXiv:1801.01207 (2018)
IBM, Node-RED. https://nodered.org/. Accessed May 7, 2021
J. Van Bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikxi, F. Piessens, M. Silberstein, T. Wenisch, Y. Yarom, R. Strackx, Foreshadow: extracting the keys to the Intel SGX kingdom with transient out-of-order execution. in 27th USENIX Security Symposium (USENIX Security 18) (2018), pp. 991–1008
C. Canella, D. Genkin, L. Giner, D. Gruss, M. Lipp, M. Minkin, D. Moghimi, F. Piessens, M. Schwarz, B. Sunar, J. Van Bulck, Y. Yarom, Fallout: Leaking data on meltdown-resistant CPUs, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019), pp. 769–784
C. Canella, K. Khasawneh, D. Gruss, The evolution of transient-execution attacks, in Proceedings of the 2020 on Great Lakes Symposium on VLSI (2020), pp. 163–168
C. Canella, S.M. Pudukotai Dinakarrao, D. Gruss, K. Khasawneh, Evolution of defenses against transient-execution attacks, in Proceedings of the 2020 on Great Lakes Symposium on VLSI (2020), pp. 169–174
O. Oleksenko, B. Trach, M. Silberstein, C. Fetzer, SpecFuzz: bringing spectre-type vulnerabilities to the surface, in 29th USENIX Security Symposium (USENIX Security 20) (2020), pp. 1481–1498
mips.com, MIPS Architecture For Programmers Volume 1-A, Available via DIALOG. https://s3-eu-west-1.amazonaws.com/downloads-mips/documents/MD00082-2B-MIPS32INT-AFP-06.01.pdf. Accessed May 7, 2021
K. Vollmar, P. Sanderson, MARS: an education-oriented MIPS assembly language simulator. SIGCSE 6, 239–243 (2006)
J. Van Bulck, D. Moghimi, M. Schwarz, M. Lipp, M. Minkin, D. Genkin, Y. Yarom, B. Sunar, D. Gruss, F. Piessens, LVI: Hijacking transient execution through microarchitectural load value injection in 2020 IEEE Symposium on Security and Privacy (SP) (2020), pp. 54–72
Intel, An optimizzed mitigation approach for load value injection. https://intel.ly/2CSsHwp. Accessed May 10, 2021
M. Larabel, The brutal performance impact from mitigating the LVI vulnerability. https://www.phoronix.com/scan.php?page=article&item=lvi-attack-perf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Miles, S., McDonough, C., Michael, E.O., Shankar Kumar, V.S., Lee, J.J. (2022). Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED. In: Verma, P., Charan, C., Fernando, X., Ganesan, S. (eds) Advances in Data Computing, Communication and Security. Lecture Notes on Data Engineering and Communications Technologies, vol 106. Springer, Singapore. https://doi.org/10.1007/978-981-16-8403-6_65
Download citation
DOI: https://doi.org/10.1007/978-981-16-8403-6_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8402-9
Online ISBN: 978-981-16-8403-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)