Typically, hardware implements TEEs, which makes it complicated for attackers to compromise the program running inside of them. With components-primarily based TEEs, we decrease the TCB for the hardware and also the Oracle application running around the TEE, not the whole computing stacks from the Oracle technique. Techniques to real-object authent