Research Article

TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices

Table 5

Log file, populated with records of violation details.

ViolationDetails
CodeUniqueIDViolated_PeripheralAddress

RWAD-4E-22-C5-61-…Fingerprint_Scanner0 × 50000000
XNCD-4E-82-35-61-…Gyro sensor0 × 70000000
0 × 7…
0 × 7…