Research Article

TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices

Algorithm 2

Enforcing the policies specified in the access table
Input: Access Table, ActiveApp
Output:
Procedure Policy_EnforcementAccess Table, ActiveApp
while Size_of(Access Table) do
  If Access Table[index] = = ActiveApp
   Access Table
   .
   
    Access Table .
   Set_Protection
   
                        ⊳ Call Procedure
    ++
   
                     ⊳ The procedure is successful
  end
end
Return ;
End Procedure