1. Introduction
The persistent threat of memory vulnerabilities remains a predominant concern in software security, as highlighted by a recent report by Microsoft revealing that approximately 70% of yearly mitigated vulnerabilities are memory-related [17]. Historically, mitigation efforts have leaned towards software-centric countermeasures like StackGuard, Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), Control Flow Integrity (CFI), and Structured Exception Handling (SEH) [29], [32]. However, these mechanisms exhibit limitations due to their specificity towards certain exploit types and lack of secondary hardware-based protection, necessitating a shift towards hardware-assisted strategies [29].