Research Article
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices
Table 3
A summary of TEE-Watchdog’s security goals.
| Security goal | Description |
| G1 | Secure world applications cannot modify TEE-Watchdog components and structures. | G2 | Normal world applications and their trusted code cannot interrupt TEE-Watchdog operations or processes that make TEE-Watchdog functional. | G3 | Malicious applications are prevented from depleting TEE-Watchdog resources. |
|
|