Research Article

TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices

Figure 7

This figure shows two trends. (a) The trend on the left is based on the increasing number of secure peripherals present in the system that require configuration and show the CPU time to enable and disable TEE-Watchdog. (b) The second trend shows the overhead of TEE-Watchdog protection mechanisms on latency (measured as delay in CPU time in microseconds) of a peripheral access. The latency increases from 1.4% to 8.8% based on the increasing number of total secure peripherals that are protected in the system.
(a)
(b)