I. Introduction
With the small power consumption, strong specialization and streamlined structure, embedded systems are increasingly used in the Internet of Things (IOT)[1], smart manufacturing, new energy vehicles and other fields[2], but the potential security threats they face are also increasingly prominent[3], such as code injection attacks (CIAs)[4], code reuse attacks (CRAs)[5], and buffer overflow attacks[6],