Research Article
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices
Figure 2
Examples from various manifest files in operating systems, IoT, firmware, etc.(a) Manifest file associated with TF-M secure services indicating identifiers, priorities, access to MMIO, etc. (b) JSON-based manifest file in Ubuntu containing information for third-party applications. (c) Manifest file associated with android applications.
| (a) |
| (b) |
| (c) |