Research Article
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices
Figure 2
Examples from various manifest files in operating systems, IoT, firmware, etc.(a) Manifest file associated with TF-M secure services indicating identifiers, priorities, access to MMIO, etc. (b) JSON-based manifest file in Ubuntu containing information for third-party applications. (c) Manifest file associated with android applications.
(a) |
(b) |
(c) |