Research Article

TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices

Figure 2

Examples from various manifest files in operating systems, IoT, firmware, etc.(a) Manifest file associated with TF-M secure services indicating identifiers, priorities, access to MMIO, etc. (b) JSON-based manifest file in Ubuntu containing information for third-party applications. (c) Manifest file associated with android applications.
(a)
(b)
(c)