SHAX: Evaluation of SVM hardware accelerator for detecting and preventing ROP on Xtensa

Omotosho, Adebayo ORCID logoORCID: https://orcid.org/0000-0002-1642-7610, Ilahi, Sirine, Castillo, Ernesto Cristopher Villegas ORCID logoORCID: https://orcid.org/0009-0005-8586-512X, Hammer, Christian ORCID logoORCID: https://orcid.org/0000-0001-5955-3732 and Bluethgen, Hans-Martin (2026) SHAX: Evaluation of SVM hardware accelerator for detecting and preventing ROP on Xtensa. Microprocessors and Microsystems, 120. art 105236. doi:10.1016/j.micpro.2025.105236 (In Press)

[thumbnail of 15639 Adebayo, O et al. (2025) SHAX - Evaluation of SVM hardware accelerator for detecting and preventing ROP on Xtensa.pdf]
Preview
Text
15639 Adebayo, O et al. (2025) SHAX - Evaluation of SVM hardware accelerator for detecting and preventing ROP on Xtensa.pdf - Published Version
Available under License Creative Commons Attribution 4.0.

Download (1MB) | Preview

Abstract

Return-oriented programming (ROP) chains together sequences of instructions residing in executable pages of the memory to compromise a program’s control flow. On embedded systems, ROP detection is intricate as such devices lack the resources to directly run sophisticated software-based detection techniques, as these are memory and CPU-intensive. However, a Field Programmable Gate Array (FPGA) can enhance the capabilities of an embedded device to handle resource-intensive tasks. Hence, this paper presents the first performance evaluation of a Support Vector Machine (SVM) hardware accelerator for automatic ROP classification on Xtensa-embedded devices using hardware performance counters (HPCs). In addition to meeting security requirements, modern cyber–physical systems must exhibit high reliability against hardware failures to ensure correct functionality. To assess the reliability level of our proposed SVM architecture, we perform simulation-based fault injection at the RT-level. To improve the efficiency of this evaluation, we utilize a hybrid virtual prototype that integrates the RT-level model of the SVM accelerator with the Tensilica LX7 Instruction Set Simulator. This setup enables early-stage reliability assessment, helping to identify vulnerabilities and reduce the need for extensive fault injection campaigns during later stages of the design process. Our evaluation results show that an SVM accelerator targeting an FPGA device can detect and prevent ROP attacks on an embedded processor with high accuracy in real time. In addition, we explore the most vulnerable locations of our SVM design to permanent faults, enabling the exploration of safety mechanisms that increase fault coverage in future works.

Item Type: Article
Article Type: Article
Uncontrolled Keywords: Security; Return-oriented programming; Support vector machines; Field programmable gate array; Xtensa Reliability; Fault injection; Hardware accelerator; Instruction set simulator
Subjects: H Social Sciences > HD Industries. Land use. Labor > HD28 Management. Industrial Management > HD61 Risk in industry. Risk management
Q Science > QA Mathematics > QA76 Computer software
Divisions: Schools and Research Institutes > School of Business, Computing and Social Sciences
Depositing User: Kamila Niekoraniec
Date Deposited: 12 Dec 2025 22:16
Last Modified: 13 Dec 2025 08:00
URI: https://eprints.glos.ac.uk/id/eprint/15639

University Staff: Request a correction | Repository Editors: Update this record

University Of Gloucestershire

Bookmark and Share

Find Us On Social Media:

Social Media Icons Facebook Twitter YouTube Pinterest Linkedin

Other University Web Sites

University of Gloucestershire, The Park, Cheltenham, Gloucestershire, GL50 2RH. Telephone +44 (0)844 8010001.