Normally, components implements TEEs, which makes it complicated for attackers to compromise the program jogging inside of them. With components-dependent TEEs, we decrease the TCB on the hardware and also the Oracle software package managing about the TEE, not the complete computing stacks from the Oracle process. Ways to real-object authenticatio