z-logo
open-access-imgOpen Access
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices
Author(s) -
Anum Khurshid,
Sileshi Demesie Yalew,
Mudassar Aslam,
Shahid Raza
Publication year - 2022
Publication title -
security and communication networks
Language(s) - Uncategorized
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0114
pISSN - 1939-0122
DOI - 10.1155/2022/8033799
Subject(s) - computer science , operating system , embedded system , computer security , software , cloud computing , trusted platform module , arm architecture , component (thermodynamics) , trusted computing , code (set theory) , computer hardware , physics , thermodynamics , set (abstract data type) , programming language

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here