The research explores how Trusted Execution Environments (TEE) safeguard embedded systems against attacks but demonstrates practical scenarios of attacking TEEs via faulting SoC system bus, revealing loopholes in TEE specification and Linux function conventions. The study emphasizes the need to reconsider API specifications and independent TEE implementations amidst the possibility of faults in not just processors or memory, but also the system bus. It underscores the importance of considering both software implementation and the execution environment for TEEs in embedded systems

 Demonstrating practical attack scenarios on Trusted Execution Environments using SoC system bus faults