Research Article
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices
Table 5
Log file, populated with records of violation details.
| Violation | Details | Code | UniqueID | Violated_Peripheral | Address |
| RW | AD-4E-22-C5-61-… | Fingerprint_Scanner | 0 × 50000000 | XN | CD-4E-82-35-61-… | Gyro sensor | 0 × 70000000 | … | … | … | 0 × 7… | … | … | … | 0 × 7… |
|
|