Research Article
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices
Algorithm 2
Enforcing the policies specified in the access table
| Input: Access Table, ActiveApp | | Output: | | | | Procedure Policy_EnforcementAccess Table, ActiveApp | | | | | | while Size_of(Access Table) do | | If Access Table[index] = = ActiveApp | | Access Table | | . | | | | Access Table . | | Set_Protection | | | | ⊳ Call Procedure | | ++ | | | | ⊳ The procedure is successful | | end | | end | | Return ; | | End Procedure |
|