Omotosho, Adebayo ORCID: https://orcid.org/0000-0002-1642-7610, Ilahi, Sirine, Castillo, Ernesto Cristopher Villegas
ORCID: https://orcid.org/0009-0005-8586-512X, Hammer, Christian
ORCID: https://orcid.org/0000-0001-5955-3732 and Bluethgen, Hans-Martin
(2026)
SHAX: Evaluation of SVM hardware accelerator for detecting and preventing ROP on Xtensa.
Microprocessors and Microsystems, 120.
art 105236.
doi:10.1016/j.micpro.2025.105236
(In Press)
Preview |
Text
15639 Adebayo, O et al. (2025) SHAX - Evaluation of SVM hardware accelerator for detecting and preventing ROP on Xtensa.pdf - Published Version Available under License Creative Commons Attribution 4.0. Download (1MB) | Preview |
Abstract
Return-oriented programming (ROP) chains together sequences of instructions residing in executable pages of the memory to compromise a program’s control flow. On embedded systems, ROP detection is intricate as such devices lack the resources to directly run sophisticated software-based detection techniques, as these are memory and CPU-intensive. However, a Field Programmable Gate Array (FPGA) can enhance the capabilities of an embedded device to handle resource-intensive tasks. Hence, this paper presents the first performance evaluation of a Support Vector Machine (SVM) hardware accelerator for automatic ROP classification on Xtensa-embedded devices using hardware performance counters (HPCs). In addition to meeting security requirements, modern cyber–physical systems must exhibit high reliability against hardware failures to ensure correct functionality. To assess the reliability level of our proposed SVM architecture, we perform simulation-based fault injection at the RT-level. To improve the efficiency of this evaluation, we utilize a hybrid virtual prototype that integrates the RT-level model of the SVM accelerator with the Tensilica LX7 Instruction Set Simulator. This setup enables early-stage reliability assessment, helping to identify vulnerabilities and reduce the need for extensive fault injection campaigns during later stages of the design process. Our evaluation results show that an SVM accelerator targeting an FPGA device can detect and prevent ROP attacks on an embedded processor with high accuracy in real time. In addition, we explore the most vulnerable locations of our SVM design to permanent faults, enabling the exploration of safety mechanisms that increase fault coverage in future works.
| Item Type: | Article |
|---|---|
| Article Type: | Article |
| Uncontrolled Keywords: | Security; Return-oriented programming; Support vector machines; Field programmable gate array; Xtensa Reliability; Fault injection; Hardware accelerator; Instruction set simulator |
| Subjects: | H Social Sciences > HD Industries. Land use. Labor > HD28 Management. Industrial Management > HD61 Risk in industry. Risk management Q Science > QA Mathematics > QA76 Computer software |
| Divisions: | Schools and Research Institutes > School of Business, Computing and Social Sciences |
| Depositing User: | Kamila Niekoraniec |
| Date Deposited: | 12 Dec 2025 22:16 |
| Last Modified: | 13 Dec 2025 08:00 |
| URI: | https://eprints.glos.ac.uk/id/eprint/15639 |
University Staff: Request a correction | Repository Editors: Update this record

Tools
Tools